Coder Social home page Coder Social logo

caracal's Introduction

camicroscope: a web-based image viewer optimized for large bio-medical image data viewing

caMicroscope is a web-based biomedical image and data viewer, with a strong emphasis on cancer pathology WSI (Whole Slide Imaging). This guide has sections for different kinds of use of the platform. The User Guide covers the basics on how to use caMicroscope viewer. nanoBorb covers nanoBorb, the version of caMicroscope designed as a standalone application for individual users without a server. Hosted Setup covers how to set up caMicroscope for multiple users on a server. Developer Guide covers the broad strokes on how to add new functionality to caMicroscope.

View Slides Measure Features Annotate Areas of Interest Alternate Annotation Method Automatic Object Detection Test Classification Models

User Guide

Selecting an Image

Depending on what is providing the image metadata, a different login process may be necessary. For public instances, no log in is necessary, and you can proceed to view slides. Use of other tools, such as annotations may or may not require login in this case. For slim instances, login should be done through a redirect directly. For pathDB instances, login should be done on the login link on the main page. At this point, select a collection, if applicable, and proceed to open or "view" the image of your choice.

Viewing an Image

Once an image is open, you can pan around the image by either clicking and dragging (when no conflicting tool, such as the pen, is open), or by moving the red bounding box in the viewport in the bottom right. Zooming can be accomplished through the scroll wheel, pinch events on a touch screen, by using the zoom slider or its associated buttons, or by clicking on the zoom number and inputting a different number.

Using Tools

The toolbar is in the top-left of the main content window. Use the toolbar buttons to manipulate the slide. To close any toolbar button, click the same button again or a new button.

Tool Name Function
Annotations Opens the Annotation panel, where you can select which annotation set to view, name that annotation set, add optional notes about the annotation set, save the annotation set, and reset the panel to its original state.
Layer Manager Opens the Layers Manager panel, where you can select which layers to view.
Home Return to the data table so that you can open another slide.
Draw Draw thin lines, thick lines, or polygons on the image. Annotations can also be computer aided using the Smart-pen tool. Draw them, stretch them, remove them. To maintain the integrity of measurements, avoid drawing shapes that overlap or intersect one another.
Preset Labels Use a preset annotation type immediately to quickly annotate a slide consistently.
Magnifier The Magnifier works like a magnifying glass and allows you to see the slide at normal magnification (1.0), low magnification (0.5), or high magnification (2.0). Click a magnification level and place the bounding box on the area of the slide you want to magnify.
Measurement Drag this tool on the slide to learn the measurement in micrometers.
Share View Opens a window with a URL to the current presentation state of the slide including the magnification level, layers that are currently open, and your position on the image.
Side by Side Viewer Shows the Layer Manager panel, the left and right layers, and inset window. For the right and left layer, select which layer you want to view.
Heatmap For a slide with heatmap data, opens the choices of heatmaps available, as well as ways of displaying the heatmaps. The gradient shows all of the values on the selected spectrum for the field you selected. Contains a heatmap edit pen function.
Labeling Use this tool to draw a circle or rectangle around a tumor region, measure an area on the slide, download labels, and submit a bug report. The Labeling tool has its own toolbar with tools in the following order from left to right: return to the previous slide, place a square on the slide, place a circle on the slide, measure an area, download labels, and submit a bug report. Click the left arrow at the far right of the toolbar to hide it, then click the right arrow to show it.
Segment This tool allows you to display, count, and export nuclear segmentations on the image. Clicking this tool opens the following custom toolbar.
Model Show results from a pre-trained tensorflow compatible model on a ROI of the slide.
Download Slide Download the slide image to your system
Mark Reviewed Use to signify the completion of review of a slide.
Bug Report Report a bug or give feedback.
Slide Capture Click to take a screenshot of the slide and annotations on it.
Tutorial Click to view a guided tour of the viewer tools.

Toolbar Shortcuts

Tool Shortcut
Annotation Ctrl + a
Magnifier Ctrl + m
Measurement Ctrl + r
Side-by-Side Ctrl + s
Close all tools ESC

Hosted Setup

The full distribution repository for hosted caMicroscope is here. run with docker-compose -f caMicroscope.yml up

this will build all services and run in the foreground. Use docker-compose -f caMicroscope.yml build to rebuild the services.

Once everything is up, go to <the host this is running on>:4010/ to see the landing page.

Other Resources

Developer Guide

We are collecting feedback to write this section in more detail. Please add your suggestions here.

caMicroscope is open source software. Any involvement and contribution with the caMicroscope project is greatly appreciated. Feel free to get directly involved in any of the repositories in the caMicroscope organization. New developers may find the notes in CONTRIBUTING helpful to start contributing to caMicroscope.

It is highly recommended to make any changes off of the develop branch of a repository, and, when ready, create a PR to the develop branch of the source repository. Before sending the PR, make sure that there are no linting errors by running npm install and then npm run lint to see the errors and npm run lint-fix to automatically fix the errors in the repository folder.

Source code organization ie the file structure of caMicroscope can be found in file structure

Fast Local Changes

When using the hosted setup, you can have the distribution host the changes from your local. Follow these steps :

  • Clone this repository, the Caracal repository and the distribution in the same parent directory
  • Set the build to build your local changes instead of the hosted git versions by editing the ca-back container section of your develop.yml. Replace the build context section with the path to your caracal checkout ("../Caracal"), and add - ../caMicroscope:/src/camicroscope to the volumes.
  • Remove this line from 'Dockerfile' in Caracal repository :
RUN git clone https://github.com/${fork:-camicroscope}/camicroscope.git --branch=${viewer:-master}
  • In Distro repository, enter the following commands :
docker-compose -f develop.yml build
docker-compose -f develop.yml up

caracal's People

Contributors

akhil-rana avatar birm avatar cgdogan avatar cjchirag7 avatar darkcavalier11 avatar dependabot[bot] avatar jasoxlee avatar mumin-khan avatar nanli-emory avatar rahuljagwani avatar siddhanth339 avatar vedant1202 avatar yashkumarverma avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

caracal's Issues

SSL

Add SSL Support, update docs for ssl if needed

mocha not in dependency list

Describe the bug

  • the project uses mocha for testing the components but does not have mocha in the dependency list.

To Reproduce

  • quickly glance through package.json and test script

Expected behavior

  • all dependencies should be listed in package.json

Screenshots

  • NA

Login Mount Fails

Describe the bug
Mounting in login.htm before camic clones fails due to the dir not yet existing, and would be overwritten if it did.

Rewrite database logic to avoid callbacks

Is your feature request related to a problem? Please describe.

  • the current implementation uses callbacks extensively for database operations.
  • this makes the code non-linear and difficult to improve/debug.
  • code becomes redundant as each layer of callback requires its own handling of errors.
  • often referred to as callback-hell ๐Ÿ”ฅ

Describe the solution you'd like

  • Since the database driver supports promises, we can either use the promise syntax or the async-await flow as an alternative. This will keep the codebase linear flow.

This will also allow us to document the codebase better as it is practically easier to document small functions than nested arrangements of them.

Describe alternatives you've considered

  • we can use third-party libraries like async.js but I personally not support adding libraries for functionality that can be easily done by built-in functions.

Additional context

Login/check breaks

ca-back | (node:432) DeprecationWarning: current Server Discovery and Monitoring engine is deprecated, and will be removed in a future version. To use the new Server Discover and Monitoring engine, pass option { useUnifiedTopology: true } to the MongoClient constructor.
ca-back | /root/src/node_modules/mongodb/lib/topologies/server.js:301
ca-back | throw err;
ca-back | ^
ca-back |
ca-back | TypeError: Cannot read property '_id' of undefined
ca-back | at /root/src/handlers/dataHandlers.js:14:20
ca-back | at /root/src/node_modules/mongodb/lib/operations/execute_operation.js:75:17
ca-back | at executeCallback (/root/src/node_modules/mongodb/lib/operations/execute_operation.js:68:9)
ca-back | at /root/src/node_modules/mongodb/lib/operations/connect.js:195:7
ca-back | at connectCallback (/root/src/node_modules/mongodb/lib/operations/connect.js:345:5)
ca-back | at /root/src/node_modules/mongodb/lib/operations/connect.js:438:5
ca-back | at Server.connectHandler (/root/src/node_modules/mongodb/lib/topologies/server.js:298:9)
ca-back | at Object.onceWrapper (events.js:417:26)
ca-back | at Server.emit (events.js:310:20)
ca-back | at Pool. (/root/src/node_modules/mongodb/lib/core/topologies/server.js:379:12)
ca-back | listening on 4010

Centralize Database operations

Current design

all components of the application (handlers) interact with the database separately. The problems associated with this:

  1. Not reusing the connection.
  2. Frequent connect-disconnect cycles to the database.
  3. Redundant codebase and associated issues
    • all calls need to establish a connection.
    • repeated access to environment variables and need to assign default cases. Even Minor change requires edit in multiple files that essentially do the same thing.
    • set configurations ({useUnifiedTopology:true, ...}) in multiple places. Difficult to ship updates or fix bugs as all calls have separate behavior if configurations do not match.

Describe the solution you'd like

  • a central provider that contains and exports all database operations that the entire project uses.
  • this would fix the problems mentioned in the current implementation.

Describe alternatives you've considered

  • we could rely on some ORM like mongoose, but considering that we're using only basic operations in the database, using an ORM like mongoose will slow down the application.

Additional context

  • This will also provide a method to implement the requested features in #82

Central style config file

Is your feature request related to a problem? Please describe.
All modern IDE's come with auto-format features, and if they don't find a config file in the project, they use the default one. This can be problematic as some dev would share a 4 space tab and other would share a 2 spaced tab, spacing in functions, curly brackets, line length etc.

Describe the solution you'd like
A config file (.prettierrc ?), configured to the style guide being used in the project.
also a stricter linter that takes into account the common practices that can cause undefined behavior. The current configuration allows using var even when its known that it can create issues. Are there any particular reasons for lenient linting rules?

Describe alternatives you've considered

  • Adding pre-commit hooks to format the codebase when user commits can also be done in addition to the above.
  • A stricter linting ruleset (maybe derived from a well-known style like AirBNB)
  • A clear formatting guideline

Additional context

Willing to work on it after discussion from mods.

Application does not terminate if database connection fails

Describe the bug

  • since various components of the application depend on a mongodb database, it should terminate if the connection is not made.

To Reproduce
Steps to reproduce the behavior:

  1. kill your MongoDB instance
  2. try running the system

Expected behavior

  1. since MongoDB is a hard dependency of the project, it must terminate if connection is not made.

Screenshots
asciicast

Desktop (please complete the following information):

  • OS: Ubuntu 19.04

Integrate Logging Library

Is your feature request related to a problem? Please describe.

  • the codebase currently relies on console.log for logging
  • this does not provide the features like assigning context to logs and dumping them to files.
  • the readme in distro says

    Logging - Container Logging is, for HIPAA reasons, disabled. Feel free to use a different logging engine if desired, especially for development.
    which means that we could a full-feature logger for development purposes.

Describe the solution you'd like

  • integration of a good logging service (like morgan?) to aid development lifecycle.
  • config to not produce logs in prod mode but give extensive logs in dev mode. Can be easily done using logging levels.

Describe alternatives you've considered

  • any other login library?
  • a custom-written bunch of methods if a dedicated library brings lot of overhead.

Additional context

  • this would greatly ease development / debugging.

Error while trying to use tfjs-node libraries in node.

Error while trying to use tfjs-node libraries in node.

Steps to reproduce the behavior:

  1. Include "@tensorflow/tfjs-node": "^2.0.1" into package.json
  2. Rebuild caracal (back) image using docker-compose
  3. Run caMicroscope using up command
  4. See error

Logs

DeepinScreenshot_select-area_20200716064916

Desktop (please complete the following information):

  • OS: Arch Linux (Deepin)

Additional context

  • Issue seems to be with alpine image in docker.
  • I tried installing libc6-compat in alpine but it didn't seem to help.
  • Changing image to stretch-slim fixes the issue for now. Looking for other solutions too.

Landing page says "Cannot Get"

Describe the bug
A clear and concise description of what the bug is.

To Reproduce
Steps to reproduce the behavior:

  1. Go to '...'
  2. Click on '....'
  3. Scroll down to '....'
  4. See error

Expected behavior
A clear and concise description of what you expected to happen.

Screenshots
If applicable, add screenshots to help explain your problem.

Desktop (please complete the following information):

  • OS: [e.g. iOS]
  • Browser [e.g. chrome, safari]
  • Version [e.g. 22]

Smartphone (please complete the following information):

  • Device: [e.g. iPhone6]
  • OS: [e.g. iOS8.1]
  • Browser [e.g. stock browser, safari]
  • Version [e.g. 22]

Additional context
Add any other context about the problem here.

make_key.sh writing keys to current directory

Describe the bug

  • make_key.sh is a utility to create keys
  • the application is hardcoded to look for keys in /keys directory. (i.e. /key/key.pub at here, here, here etc)
  • running the utility script generates the keys in the directory from where it's called.
  • So if someone does bash keys/make_key.sh, then the keys would be generated in the root folder / and not in /keys/.
  • This can cause issues, as the readme also does not cover this case.

To Reproduce

  • open repo root (/)
  • run bash keys/make_key.sh
  • keys would be generated in repo root (/) and not in /keys directory.

Expected behavior

  • the keys must always be generated in the correct directory, irrespective of the location of the call.

Screenshots

  • N/A

Desktop (please complete the following information):

  • OS: Ubuntu 19.04

Additional context

  • SheBang also missing.

Easy Auth Hooks

Add handlers to interpret other auth setups.
Implement at least one type, document which others may be useful.

Pickier Deletion

As flexible as the data handlers are, it has a side effect that no query just returns the first slide for deletion. By some method, possibly by requiring the uuid _id field to be set in the query, we should be sure that someone means to perform the delete they're doing.

tfjs install err on osx

building develop.yml on osx returns:

Step 6/11 : RUN npm install
 ---> Running in 20c5e97fea74
npm ERR! code ENOENT
npm ERR! syscall chmod
npm ERR! path /root/src/node_modules/@tensorflow/tfjs/dist/tools/custom_bundle/cli.js
npm ERR! errno -2
npm ERR! enoent ENOENT: no such file or directory, chmod '/root/src/node_modules/@tensorflow/tfjs/dist/tools/custom_bundle/cli.js'
npm ERR! enoent This is related to npm not being able to find a file.
npm ERR! enoent

npm ERR! A complete log of this run can be found in:
npm ERR!     /root/.npm/_logs/2020-08-14T00_33_08_704Z-debug.log
ERROR: Service 'back' failed to build: The command '/bin/sh -c npm install' returned a non-zero code: 254

I'm away now, so I don't know if this is os specific.

New Structure of routes.json with access specifiers

Is your feature request related to a problem? Please describe.

  • to clearly map user types/roles to resources, a new property is added to each of the route entries.
  • this entry is used to uniquely identify the resource so that further application logic can be implemented.

Describe the solution you'd like

https://i.imgur.com/OHwjDDE.png

  • by adding a new property which specify the resource (i.e. /slide) and the operation on it (i.e. /create, /delete ...)
{
   "route": "/data/Template/post",
   "method": "post",
   "access": {
     "entity": "template",
     "operation": "create"
   },
   "handlers": []
 }

Package does not have valid "main" entry

Describe the bug
node . returns error as entry point does not exist

To Reproduce
Steps to reproduce the behavior:

  1. clone the repository
  2. run node .

Expected behavior
The command must execute the entry point of application

Screenshots
image

Desktop (please complete the following information):

  • OS: [e.g. Ubuntu 19.04]
  • Browser: Google Chrome | 88.0.4324.182ย (Official Build)ย (64-bit)

Discussion regarding key generation

if (!fs.existsSync('./keys/key') && !fs.existsSync('./keys/key.pub') && GENERATE_KEY_IF_MISSING) {
try {
execSync(`${preCommand}'/CN=www.camicroscope.com/O=caMicroscope Local Instance Key./C=US'${postCommand}`);
} catch (err) {
console.log({err: err});
}
}

I had the following queries about the following lines.

  • is the sole purpose of these lines is to create the keys programmatically at runtime? afaik this should be done in the docker-compose step and not during runtime?
  • If the above is false (i.e. these have separate responsibilities), then the keys should be generated when either of the file is missing right? The code will execute only if both of the files are missing.
  • also, is there any particular reason for dividing the string into three segments, pre, mid and post?

Bugs related to accessing undefined values in dev-backup branch

Describe the bug
When I run the application using docker-compose with Caracal (develop branch), caMicroscope, and Distro repos, I get errors based on accessing undefined values from the /Caracal/service/database/connector.js and the /Caracal/handlers/dataTransformationHandler.js files

To Reproduce
Steps to reproduce the behavior:

  1. Run docker-compose -f develop.yml build
  2. Then, run docker-compose -f develop.yml up
  3. See the errors

Expected behavior
Run the application smoothly without any errors.

Screenshots

error-undefined

lengthUndefined

System Information:

Device: LENOVO_MT_81DE_BU_idea_FM_ideapad 330-15IKB
Processor: Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz, 1800 Mhz, 4 Core(s), 8 Logical Processor(s)
OS: Microsoft Windows 10 Home
Browser: Chrome
Version: 10.0.19041 Build 19041

Additional context
I suspect that these errors are due to lots of callback functions. The values of variables are being accessed outside the callback functions which are asynchronous, this being the main cause.
Files to look into:

  • /Caracal/service/database/connector.js
  • /Caracal/service/database/index.js
  • /Caracal/handlers/dataTransformationHandler.js files

"What can I do" Route

Following camicroscope/caMicroscope#303 it may be useful to have a GET route which uses the token info as applicable and the server info to tell a user what they can do. (e.g. delete a slide). This should be responsive to environment variables, especially DISABLE_SEC

Consider Per-route config

Similar to the security repo before, and the coypu project which inspired this, maybe we want the routes to be read from a conf file on startup, rather than be in caracal.js. Or maybe not.

Status Report Route

For uptime/monitor, add a route which checks on the status of the server, public route by default.

Issues Reported by Docker Scan

Testing distro_back...

โœ— Low severity vulnerability found in tar
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-TAR-1063003
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]

โœ— Low severity vulnerability found in tar
Description: CVE-2005-2541
Info: https://snyk.io/vuln/SNYK-DEBIAN9-TAR-312330
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]

โœ— Low severity vulnerability found in tar
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-TAR-341215
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Authentication Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-1291055
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-305045
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-305135
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-305139
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-305143
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-305165
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Missing Release of Resource after Effective Lifetime
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-542812
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in systemd/libsystemd0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-570989
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in sqlite3/libsqlite3-0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SQLITE3-307555
Introduced through: gnupg2/[email protected]deb9u4, python3-defaults/[email protected]
From: gnupg2/[email protected]
deb9u4 > sqlite3/[email protected]+deb9u3
From: python3-defaults/[email protected] > [email protected]+deb9u4 > python3.5/[email protected]+deb9u4 > sqlite3/[email protected]+deb9u3

โœ— Low severity vulnerability found in sqlite3/libsqlite3-0
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SQLITE3-565215
Introduced through: gnupg2/[email protected]deb9u4, python3-defaults/[email protected]
From: gnupg2/[email protected]
deb9u4 > sqlite3/[email protected]+deb9u3
From: python3-defaults/[email protected] > [email protected]+deb9u4 > python3.5/[email protected]+deb9u4 > sqlite3/[email protected]+deb9u3

โœ— Low severity vulnerability found in shadow/passwd
Description: Time-of-check Time-of-use (TOCTOU)
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SHADOW-306204
Introduced through: shadow/passwd@1:4.4-4.1+deb9u1, openssh/openssh-client@1:7.4p1-10+deb9u7, util-linux/[email protected]+deb9u1, [email protected], shadow/login@1:4.4-4.1+deb9u1
From: shadow/passwd@1:4.4-4.1+deb9u1
From: openssh/openssh-client@1:7.4p1-10+deb9u7 > shadow/passwd@1:4.4-4.1+deb9u1
From: util-linux/[email protected]+deb9u1 > shadow/passwd@1:4.4-4.1+deb9u1
and 2 more...

โœ— Low severity vulnerability found in shadow/passwd
Description: Incorrect Permission Assignment for Critical Resource
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SHADOW-306229
Introduced through: shadow/passwd@1:4.4-4.1+deb9u1, openssh/openssh-client@1:7.4p1-10+deb9u7, util-linux/[email protected]+deb9u1, [email protected], shadow/login@1:4.4-4.1+deb9u1
From: shadow/passwd@1:4.4-4.1+deb9u1
From: openssh/openssh-client@1:7.4p1-10+deb9u7 > shadow/passwd@1:4.4-4.1+deb9u1
From: util-linux/[email protected]+deb9u1 > shadow/passwd@1:4.4-4.1+deb9u1
and 2 more...

โœ— Low severity vulnerability found in shadow/passwd
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SHADOW-306249
Introduced through: shadow/passwd@1:4.4-4.1+deb9u1, openssh/openssh-client@1:7.4p1-10+deb9u7, util-linux/[email protected]+deb9u1, [email protected], shadow/login@1:4.4-4.1+deb9u1
From: shadow/passwd@1:4.4-4.1+deb9u1
From: openssh/openssh-client@1:7.4p1-10+deb9u7 > shadow/passwd@1:4.4-4.1+deb9u1
From: util-linux/[email protected]+deb9u1 > shadow/passwd@1:4.4-4.1+deb9u1
and 2 more...

โœ— Low severity vulnerability found in shadow/passwd
Description: Incorrect Permission Assignment for Critical Resource
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SHADOW-539860
Introduced through: shadow/passwd@1:4.4-4.1+deb9u1, openssh/openssh-client@1:7.4p1-10+deb9u7, util-linux/[email protected]+deb9u1, [email protected], shadow/login@1:4.4-4.1+deb9u1
From: shadow/passwd@1:4.4-4.1+deb9u1
From: openssh/openssh-client@1:7.4p1-10+deb9u7 > shadow/passwd@1:4.4-4.1+deb9u1
From: util-linux/[email protected]+deb9u1 > shadow/passwd@1:4.4-4.1+deb9u1
and 2 more...

โœ— Low severity vulnerability found in python3.5/libpython3.5-stdlib
Description: Arbitrary Code Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON35-304701
Introduced through: python3-defaults/[email protected]
From: python3-defaults/[email protected] > python3-defaults/[email protected] > python3.5/[email protected]+deb9u4
From: python3-defaults/[email protected] > [email protected]+deb9u4 > python3.5/[email protected]+deb9u4
From: python3-defaults/[email protected] > python3-defaults/[email protected] > python3.5/[email protected]+deb9u4
and 4 more...

โœ— Low severity vulnerability found in python3.5/libpython3.5-stdlib
Description: Resource Exhaustion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON35-546417
Introduced through: python3-defaults/[email protected]
From: python3-defaults/[email protected] > python3-defaults/[email protected] > python3.5/[email protected]+deb9u4
From: python3-defaults/[email protected] > [email protected]+deb9u4 > python3.5/[email protected]+deb9u4
From: python3-defaults/[email protected] > python3-defaults/[email protected] > python3.5/[email protected]+deb9u4
and 4 more...

โœ— Low severity vulnerability found in perl/perl-modules-5.24
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PERL-327792
Introduced through: [email protected], git@1:2.11.0-3+deb9u7, libalgorithm-diff-xs-perl/[email protected]+b2, [email protected], libfile-fcntllock-perl/[email protected]+b2, [email protected], meta-common-packages@meta
From: [email protected] > dpkg/[email protected] > dpkg/[email protected] > [email protected]+deb9u7 > perl/[email protected]+deb9u7
From: [email protected] > dpkg/[email protected] > dpkg/[email protected] > [email protected]+deb9u7 > perl/[email protected]+deb9u7 > perl/[email protected]+deb9u7
From: [email protected] > dpkg/[email protected] > dpkg/[email protected] > [email protected]+deb9u7 > perl/[email protected]+deb9u7
and 9 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PCRE3-345320
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-3

โœ— Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PCRE3-345352
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-3

โœ— Low severity vulnerability found in pcre3/libpcre3
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PCRE3-345501
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-3

โœ— Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PCRE3-345529
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-3

โœ— Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PCRE3-572352
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-3

โœ— Low severity vulnerability found in patch
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PATCH-303834
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]+deb9u2
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in patch
Description: Double Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PATCH-303853
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]+deb9u2
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in patch
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PATCH-303869
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]+deb9u2
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in patch
Description: Directory Traversal
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PATCH-303892
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]+deb9u2
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openssl
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSL-374708
Introduced through: [email protected]deb9u3, ca-certificates@20200601deb9u2, cyrus-sasl2/[email protected]101-g0780600+dfsg-3+deb9u1, python3-defaults/[email protected]
From: [email protected]
deb9u3
From: ca-certificates@20200601deb9u2 > [email protected]deb9u3
From: [email protected]deb9u3 > openssl/[email protected]deb9u3
and 2 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openssl
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSL-374995
Introduced through: [email protected]deb9u3, ca-certificates@20200601deb9u2, cyrus-sasl2/[email protected]101-g0780600+dfsg-3+deb9u1, python3-defaults/[email protected]
From: [email protected]
deb9u3
From: ca-certificates@20200601deb9u2 > [email protected]deb9u3
From: [email protected]deb9u3 > openssl/[email protected]deb9u3
and 2 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openssl
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSL-536850
Introduced through: [email protected]deb9u3, ca-certificates@20200601deb9u2, cyrus-sasl2/[email protected]101-g0780600+dfsg-3+deb9u1, python3-defaults/[email protected]
From: [email protected]
deb9u3
From: ca-certificates@20200601deb9u2 > [email protected]deb9u3
From: [email protected]deb9u3 > openssl/[email protected]deb9u3
and 2 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-368616
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-368832
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-368924
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Improper Authentication
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-369015
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Inappropriate Encoding for Output Context
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-369019
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-570877
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-574763
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openssh/openssh-client
Description: OS Command Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSH-590146
Introduced through: openssh/openssh-client@1:7.4p1-10+deb9u7
From: openssh/openssh-client@1:7.4p1-10+deb9u7

โœ— Low severity vulnerability found in openldap/libldap-common
Description: Improper Initialization
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENLDAP-304600
Introduced through: git@1:2.11.0-3+deb9u7, gnupg2/[email protected]deb9u4
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8 > openldap/[email protected]+dfsg-5+deb9u8
From: gnupg2/[email protected]
deb9u4 > openldap/[email protected]+dfsg-5+deb9u8
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openldap/libldap-common
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENLDAP-304653
Introduced through: git@1:2.11.0-3+deb9u7, gnupg2/[email protected]deb9u4
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8 > openldap/[email protected]+dfsg-5+deb9u8
From: gnupg2/[email protected]
deb9u4 > openldap/[email protected]+dfsg-5+deb9u8
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openldap/libldap-common
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENLDAP-304665
Introduced through: git@1:2.11.0-3+deb9u7, gnupg2/[email protected]deb9u4
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8 > openldap/[email protected]+dfsg-5+deb9u8
From: gnupg2/[email protected]
deb9u4 > openldap/[email protected]+dfsg-5+deb9u8
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in openldap/libldap-common
Description: Improper Certificate Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-OPENLDAP-584935
Introduced through: git@1:2.11.0-3+deb9u7, gnupg2/[email protected]deb9u4
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8 > openldap/[email protected]+dfsg-5+deb9u8
From: gnupg2/[email protected]
deb9u4 > openldap/[email protected]+dfsg-5+deb9u8
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in nghttp2/libnghttp2-14
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-NGHTTP2-351879
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > nghttp2/[email protected]+deb9u1
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in ncurses/libtinfo5
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-NCURSES-343181
Introduced through: [email protected], [email protected], libedit/[email protected], ncurses/[email protected]+20161126-1+deb9u2, [email protected]+deb9u2, gnupg2/[email protected]~deb9u4, python3-defaults/[email protected], ncurses/[email protected]+20161126-1+deb9u2, ncurses/[email protected]+20161126-1+deb9u2
From: [email protected] > ncurses/[email protected]+20161126-1+deb9u2
From: [email protected] > ncurses/[email protected]+20161126-1+deb9u2
From: libedit/[email protected] > ncurses/[email protected]+20161126-1+deb9u2
and 14 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in ncurses/libtinfo5
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-NCURSES-473135
Introduced through: [email protected], [email protected], libedit/[email protected], ncurses/[email protected]+20161126-1+deb9u2, [email protected]+deb9u2, gnupg2/[email protected]~deb9u4, python3-defaults/[email protected], ncurses/[email protected]+20161126-1+deb9u2, ncurses/[email protected]+20161126-1+deb9u2
From: [email protected] > ncurses/[email protected]+20161126-1+deb9u2
From: [email protected] > ncurses/[email protected]+20161126-1+deb9u2
From: libedit/[email protected] > ncurses/[email protected]+20161126-1+deb9u2
and 14 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in ncurses/libtinfo5
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-NCURSES-473138
Introduced through: [email protected], [email protected], libedit/[email protected], ncurses/[email protected]+20161126-1+deb9u2, [email protected]+deb9u2, gnupg2/[email protected]~deb9u4, python3-defaults/[email protected], ncurses/[email protected]+20161126-1+deb9u2, ncurses/[email protected]+20161126-1+deb9u2
From: [email protected] > ncurses/[email protected]+20161126-1+deb9u2
From: [email protected] > ncurses/[email protected]+20161126-1+deb9u2
From: libedit/[email protected] > ncurses/[email protected]+20161126-1+deb9u2
and 14 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in lz4/liblz4-1
Description: Buffer Overflow
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LZ4-473077
Introduced through: lz4/[email protected]r131-2+deb9u1, apt/[email protected], util-linux/bsdutils@1:2.29.2-1+deb9u1
From: lz4/[email protected]
r131-2+deb9u1
From: apt/[email protected] > lz4/[email protected]r131-2+deb9u1
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12 > lz4/[email protected]
r131-2+deb9u1

โœ— Low severity vulnerability found in libtasn1-6
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LIBTASN16-339584
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > gnutls28/[email protected]+deb9u5 > [email protected]+deb9u1
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in libssh2/libssh2-1
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LIBSSH2-474375
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > libssh2/[email protected]+deb9u1
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in libgcrypt20
Description: CVE-2021-33560
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LIBGCRYPT20-1297891
Introduced through: gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, util-linux/bsdutils@1:2.29.2-1+deb9u1, git@1:2.11.0-3+deb9u7
From: gnupg2/[email protected]
deb9u4 > [email protected]+deb9u3
From: gnupg2/[email protected]deb9u4 > [email protected]+deb9u3
From: gnupg2/[email protected]
deb9u4 > [email protected]+deb9u3
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in libgcrypt20
Description: Use of a Broken or Risky Cryptographic Algorithm
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LIBGCRYPT20-391901
Introduced through: gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, util-linux/bsdutils@1:2.29.2-1+deb9u1, git@1:2.11.0-3+deb9u7
From: gnupg2/[email protected]
deb9u4 > [email protected]+deb9u3
From: gnupg2/[email protected]deb9u4 > [email protected]+deb9u3
From: gnupg2/[email protected]
deb9u4 > [email protected]+deb9u3
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in krb5/libkrb5support0
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-395791
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in krb5/libkrb5support0
Description: Double Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-395844
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in krb5/libkrb5support0
Description: CVE-2004-0971
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-395882
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in krb5/libkrb5support0
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-395954
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in krb5/libkrb5support0
Description: LDAP Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-396210
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in krb5/libkrb5support0
Description: Reachable Assertion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-396226
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in gnutls28/libgnutls30
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GNUTLS28-340754
Introduced through: gnupg2/[email protected]deb9u4, git@1:2.11.0-3+deb9u7
From: gnupg2/[email protected]
deb9u4 > gnutls28/[email protected]+deb9u5
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > gnutls28/[email protected]+deb9u5
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8 > gnutls28/[email protected]+deb9u5
and 1 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in gnupg2/gpgv
Description: Key Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GNUPG2-340421
Introduced through: gnupg2/[email protected]deb9u4, [email protected]+deb9u1, [email protected], gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4
From: gnupg2/[email protected]
deb9u4
From: [email protected]+deb9u1 > gnupg2/[email protected]deb9u4
From: [email protected] > gnupg2/[email protected]
deb9u4
and 5 more...

โœ— Low severity vulnerability found in gnupg2/gpgv
Description: Use of a Broken or Risky Cryptographic Algorithm
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GNUPG2-535537
Introduced through: gnupg2/[email protected]deb9u4, [email protected]+deb9u1, [email protected], gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4
From: gnupg2/[email protected]
deb9u4
From: [email protected]+deb9u1 > gnupg2/[email protected]deb9u4
From: [email protected] > gnupg2/[email protected]
deb9u4
and 5 more...

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Double Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-1078994
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-338103
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-338175
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356366
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356370
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Improper Data Handling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356500
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Improper Resource Shutdown or Release
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356631
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356670
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356734
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: CVE-2010-4051
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356874
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-453121
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-453364
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Use of Insufficiently Random Values
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-453579
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-453766
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-534996
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in glibc/libc6-dev
Description: Integer Underflow
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-564230
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in git/git-man
Description: Resource Exhaustion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GIT-340839
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > git/git-man@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in git/git-man
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GIT-340853
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > git/git-man@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in git/git-man
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GIT-537131
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > git/git-man@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in git/git-man
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GIT-537167
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > git/git-man@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in git/git-man
Description: Use of Incorrectly-Resolved Name or Reference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GIT-537175
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > git/git-man@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in expat/libexpat1
Description: XML External Entity (XXE) Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN9-EXPAT-358078
Introduced through: git@1:2.11.0-3+deb9u7, python3-defaults/[email protected]
From: git@1:2.11.0-3+deb9u7 > expat/[email protected]+deb9u3
From: python3-defaults/[email protected] > [email protected]+deb9u4 > python3.5/[email protected]+deb9u4 > expat/[email protected]+deb9u3
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in curl/libcurl3-gnutls
Description: CVE-2021-22898
Info: https://snyk.io/vuln/SNYK-DEBIAN9-CURL-1296888
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in coreutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-COREUTILS-317464
Introduced through: [email protected]
From: [email protected]

โœ— Low severity vulnerability found in coreutils
Description: Race Condition
Info: https://snyk.io/vuln/SNYK-DEBIAN9-COREUTILS-317493
Introduced through: [email protected]
From: [email protected]

โœ— Low severity vulnerability found in binutils
Description: Double Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1050283
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1050284
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1050294
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1050296
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1050300
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1054597
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1055020
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1055022
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Use of Uninitialized Resource
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1055027
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1055151
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1055155
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1065549
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1086499
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1089441
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1244574
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: CVE-2021-3530
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1292160
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-1296880
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-337980
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-337988
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-337995
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-338005
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-338008
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-338013
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403330
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403339
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403355
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403371
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403433
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403442
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403451
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403460
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403498
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403516
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403532
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403573
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403592
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403599
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403631
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403661
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403695
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403711
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403720
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403734
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403741
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403776
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Missing Release of Resource after Effective Lifetime
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403784
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403792
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403804
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403816
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403836
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403840
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403852
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403856
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403860
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403864
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403872
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Incorrect Calculation of Buffer Size
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403904
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403908
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403912
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403924
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403928
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403932
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Resource Exhaustion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403940
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403944
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403948
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403960
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403968
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403976
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403984
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403988
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403992
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404000
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404004
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404008
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Divide By Zero
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404016
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404024
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404032
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404036
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404040
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404044
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404048
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404052
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404056
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404060
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404089
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404125
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404129
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404137
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Incorrect Type Conversion or Cast
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404141
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404145
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404149
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404157
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404161
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404165
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404174
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404178
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404189
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404193
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404205
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Missing Release of Resource after Effective Lifetime
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404209
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404213
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404217
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404221
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404229
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404233
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Missing Release of Resource after Effective Lifetime
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404237
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404241
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404245
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404257
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404269
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-451154
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-455452
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-455459
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-456013
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-456768
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-472899
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in binutils
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-472912
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Low severity vulnerability found in bash
Description: Improper Check for Dropped Privileges
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BASH-536274
Introduced through: [email protected]
From: [email protected]

โœ— Low severity vulnerability found in apt/libapt-pkg5.0
Description: Improper Verification of Cryptographic Signature
Info: https://snyk.io/vuln/SNYK-DEBIAN9-APT-407501
Introduced through: apt/[email protected], [email protected]
From: apt/[email protected]
From: [email protected] > apt/[email protected]
From: [email protected]

โœ— Medium severity vulnerability found in tar
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-TAR-312293
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]

โœ— Medium severity vulnerability found in pcre3/libpcre3
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-PCRE3-572364
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-3

โœ— Medium severity vulnerability found in nettle/libnettle6
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-NETTLE-302009
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > nettle/[email protected]+b2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > gnutls28/[email protected]+deb9u5 > nettle/[email protected]+b2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > rtmpdump/[email protected]+20151223.gitfa8646d.1-1+b1 > nettle/[email protected]+b2
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in libgcrypt20
Description: Race Condition
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LIBGCRYPT20-460491
Introduced through: gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, util-linux/bsdutils@1:2.29.2-1+deb9u1, git@1:2.11.0-3+deb9u7
From: gnupg2/[email protected]
deb9u4 > [email protected]+deb9u3
From: gnupg2/[email protected]deb9u4 > [email protected]+deb9u3
From: gnupg2/[email protected]
deb9u4 > [email protected]+deb9u3
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in krb5/libkrb5support0
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-396036
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in krb5/libkrb5support0
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-KRB5-396218
Introduced through: git@1:2.11.0-3+deb9u7, openssh/openssh-client@1:7.4p1-10+deb9u7, krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2 > krb5/[email protected]+deb9u2
and 8 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in gnutls28/libgnutls30
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GNUTLS28-340579
Introduced through: gnupg2/[email protected]deb9u4, git@1:2.11.0-3+deb9u7
From: gnupg2/[email protected]
deb9u4 > gnutls28/[email protected]+deb9u5
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > gnutls28/[email protected]+deb9u5
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > openldap/[email protected]+dfsg-5+deb9u8 > gnutls28/[email protected]+deb9u5
and 1 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in glibc/libc6-dev
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-1035461
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in glibc/libc6-dev
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-1055402
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in glibc/libc6-dev
Description: Allocation of Resources Without Limits or Throttling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356559
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in glibc/libc6-dev
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356682
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in glibc/libc6-dev
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-559182
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403704
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403756
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403763
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403788
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403808
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403812
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403824
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403868
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403880
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403888
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403896
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403952
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403956
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403964
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403980
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— Medium severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404197
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in util-linux/libblkid1
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN9-UTILLINUX-285822
Introduced through: util-linux/[email protected]+deb9u1, util-linux/[email protected]+deb9u1, [email protected]+deb9u2, util-linux/[email protected]+deb9u1, util-linux/[email protected]+deb9u1, util-linux/[email protected]+deb9u1, util-linux/[email protected]+deb9u1, [email protected]+deb9u1, sysvinit/[email protected], util-linux/bsdutils@1:2.29.2-1+deb9u1
From: util-linux/[email protected]+deb9u1
From: util-linux/[email protected]+deb9u1 > util-linux/[email protected]+deb9u1
From: [email protected]+deb9u2 > util-linux/[email protected]+deb9u1
and 21 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in systemd/libsystemd0
Description: Incorrect Privilege Assignment
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-345383
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in systemd/libsystemd0
Description: Privilege Chaining
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-345390
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in systemd/libsystemd0
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SYSTEMD-546478
Introduced through: systemd/libsystemd0@232-25+deb9u12, util-linux/bsdutils@1:2.29.2-1+deb9u1, [email protected]+deb9u2, systemd/libudev1@232-25+deb9u12, util-linux/[email protected]+deb9u1
From: systemd/libsystemd0@232-25+deb9u12
From: util-linux/bsdutils@1:2.29.2-1+deb9u1 > systemd/libsystemd0@232-25+deb9u12
From: [email protected]+deb9u2 > [email protected]+deb9u1 > systemd/libsystemd0@232-25+deb9u12
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in sqlite3/libsqlite3-0
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-SQLITE3-348055
Introduced through: gnupg2/[email protected]deb9u4, python3-defaults/[email protected]
From: gnupg2/[email protected]
deb9u4 > sqlite3/[email protected]+deb9u3
From: python3-defaults/[email protected] > [email protected]+deb9u4 > python3.5/[email protected]+deb9u4 > sqlite3/[email protected]+deb9u3

โœ— High severity vulnerability found in rsync
Description: Security Features
Info: https://snyk.io/vuln/SNYK-DEBIAN9-RSYNC-345681
Introduced through: [email protected]+deb9u2
From: [email protected]+deb9u2

โœ— High severity vulnerability found in nettle/libnettle6
Description: Use of a Broken or Risky Cryptographic Algorithm
Info: https://snyk.io/vuln/SNYK-DEBIAN9-NETTLE-1090207
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > nettle/[email protected]+b2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > gnutls28/[email protected]+deb9u5 > nettle/[email protected]+b2
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > rtmpdump/[email protected]+20151223.gitfa8646d.1-1+b1 > nettle/[email protected]+b2
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in libssh2/libssh2-1
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-LIBSSH2-453578
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > curl/[email protected]+deb9u14 > libssh2/[email protected]+deb9u1
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in gnupg2/gpgv
Description: Cross-site Request Forgery (CSRF)
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GNUPG2-340461
Introduced through: gnupg2/[email protected]deb9u4, [email protected]+deb9u1, [email protected], gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4, gnupg2/[email protected]deb9u4
From: gnupg2/[email protected]
deb9u4
From: [email protected]+deb9u1 > gnupg2/[email protected]deb9u4
From: [email protected] > gnupg2/[email protected]
deb9u4
and 5 more...

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Reachable Assertion
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-1065766
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-1296897
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Improper Data Handling
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-338160
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-338164
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356602
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356851
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-356862
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-559491
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in glibc/libc6-dev
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GLIBC-559495
Introduced through: [email protected], glibc/[email protected]+deb9u4, meta-common-packages@meta
From: [email protected] > glibc/[email protected]+deb9u4
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > gcc-6/[email protected]+deb9u1 > glibc/[email protected]+deb9u4
From: [email protected] > glibc/[email protected]+deb9u4 > glibc/[email protected]+deb9u4
and 3 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in git/git-man
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GIT-1083855
Introduced through: git@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7 > git/git-man@1:2.11.0-3+deb9u7
From: git@1:2.11.0-3+deb9u7
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in gcc-6
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN9-GCC6-347562
Introduced through: [email protected], meta-common-packages@meta
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > [email protected]+deb9u1
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1
From: [email protected] > gcc-defaults/g++@4:6.3.0-4 > gcc-6/[email protected]+deb9u1 > [email protected]+deb9u1
and 20 more...
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in file/libmagic-mgc
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-FILE-337544
Introduced through: file/libmagic-mgc@1:5.30-1+deb9u3, file@1:5.30-1+deb9u3, file/libmagic1@1:5.30-1+deb9u3
From: file/libmagic-mgc@1:5.30-1+deb9u3
From: file@1:5.30-1+deb9u3 > file/libmagic1@1:5.30-1+deb9u3 > file/libmagic-mgc@1:5.30-1+deb9u3
From: file/libmagic1@1:5.30-1+deb9u3
and 2 more...

โœ— High severity vulnerability found in file/libmagic-mgc
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-FILE-337553
Introduced through: file/libmagic-mgc@1:5.30-1+deb9u3, file@1:5.30-1+deb9u3, file/libmagic1@1:5.30-1+deb9u3
From: file/libmagic-mgc@1:5.30-1+deb9u3
From: file@1:5.30-1+deb9u3 > file/libmagic1@1:5.30-1+deb9u3 > file/libmagic-mgc@1:5.30-1+deb9u3
From: file/libmagic1@1:5.30-1+deb9u3
and 2 more...

โœ— High severity vulnerability found in bzip2
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BZIP2-450801
Introduced through: [email protected], meta-common-packages@meta
From: [email protected] > dpkg/[email protected] > [email protected]
From: meta-common-packages@meta > bzip2/[email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403348
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403405
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403412
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403419
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403426
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403469
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403566
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403640
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403647
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403654
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403677
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403727
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403780
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403844
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-403884
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404028
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404068
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404075
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404082
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404153
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

โœ— High severity vulnerability found in binutils
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN9-BINUTILS-404253
Introduced through: [email protected]
From: [email protected] > dpkg/[email protected] > [email protected]
From: [email protected] > gcc-defaults/gcc@4:6.3.0-4 > [email protected]+deb9u1 > [email protected]
Image layer: 'RUN /bin/sh -c apt-get update && apt-get upgrade -y && apt-get install -y git build-essential python3 '

------------ Detected 10 vulnerabilities for [email protected] ------------

โœ— Low severity vulnerability found in node
Description: Buffer Overflow
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1078519
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.16.0

โœ— Medium severity vulnerability found in node
Description: Buffer Overflow
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1009920
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.9.0

โœ— Medium severity vulnerability found in node
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1055471
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.15.4

โœ— Medium severity vulnerability found in node
Description: DNS Rebinding
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1078518
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.16.0

โœ— Medium severity vulnerability found in node
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1243766
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.16.1

โœ— Medium severity vulnerability found in node
Description: HTTP Request Smuggling
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-674660
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.11.0

โœ— High severity vulnerability found in node
Description: HTTP Request Smuggling
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1055465
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.15.4

โœ— High severity vulnerability found in node
Description: Denial of Service (DoS)
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1078517
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.16.0

โœ— High severity vulnerability found in node
Description: Improper Certificate Validation
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-1243765
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.16.1

โœ— High severity vulnerability found in node
Description: Denial of Service (DoS)
Info: https://snyk.io/vuln/SNYK-UPSTREAM-NODE-674659
Introduced through: [email protected]
From: [email protected]
Fixed in: 14.11.0

Organization: undefined
Package manager: deb
Project name: docker-image|distro_back
Docker image: distro_back
Platform: linux/amd64

Tested 200 dependencies for known vulnerabilities, found 288 vulnerabilities.

For more free scans that keep your images secure, sign up to Snyk at https://dockr.ly/3ePqVcp

Mysterious Exit

Caracal docker exits with 132 at least sometimes.
This happens consistently on emory's pathdb server during an upgrade.

Looking into this.

ca-security      | prikey null since DISABLE_SEC and no prikey provided
ca-security      | pubkey null since DISABLE_SEC and no prikey provided
ca-security      | Illegal instruction (core dumped)
ca-security exited with code 132

uncaught dup key with caracal @ develop

ca-back   | MongoError: E11000 duplicate key error collection: camic.configuration index: config_name_1 dup key: { config_name: "additional_links" }
ca-back   |     at MessageStream.messageHandler (/src/node_modules/mongodb/lib/cmap/connection.js:268:20)
ca-back   |     at MessageStream.emit (node:events:394:28)
ca-back   |     at processIncomingData (/src/node_modules/mongodb/lib/cmap/message_stream.js:144:12)
ca-back   |     at MessageStream._write (/src/node_modules/mongodb/lib/cmap/message_stream.js:42:5)
ca-back   |     at writeOrBuffer (node:internal/streams/writable:389:12)
ca-back   |     at _write (node:internal/streams/writable:330:10)
ca-back   |     at MessageStream.Writable.write (node:internal/streams/writable:334:10)
ca-back   |     at Socket.ondata (node:internal/streams/readable:749:22)
ca-back   |     at Socket.emit (node:events:394:28)
ca-back   |     at addChunk (node:internal/streams/readable:312:12) {
ca-back   |   ok: 0,
ca-back   |   code: 11000,
ca-back   |   codeName: 'DuplicateKey',
ca-back   |   keyPattern: { config_name: 1 },
ca-back   |   keyValue: { config_name: 'additional_links' }
ca-back   | }

Developer Environment Setup Script

Is your feature request related to a problem? Please describe.

  • setting up the development environment for the project can be a long process
  • The database configurations have to imported manually from the /Distro repository
  • New community members can be confused regarding multiple steps that exist.

Describe the solution you'd like

  • a simple script to setup the development environment

Describe alternatives you've considered

  • N/A

Additional context

  • this script can allow easy onboarding, as a lot of developers faced issues (and posted queries in Google Groups) in setting up the project locally.
  • This script can walk through the process of the same.

use dotenv to handle environment variables

Is your feature request related to a problem? Please describe.
by using a .env file, we can handle & document environment variables in a better manner as

  • no need to pass as cli option
  • can be used while running scripts
  • can be grouped and used in batches

Describe the solution you'd like

  • using a library like dotenv which uses a .env file.
  • (also?) a .env.example file with all possible configuration options that are possible via environment variables.

Describe alternatives you've considered

  • yaml based configs can also be used.

Additional context
Add any other context or screenshots about the feature request here.

willing to work on it

Discussion : Migrate to PM2

Is your feature request related to a problem? Please describe.

  • the code currently relies on throng,
  • throng handles a subset of features that are provided by other alternatives like pm2
  • and most importantly, requires a particular application structure and code refactor to work like this function

New Possibilities that open up

  • use a watch mode to test changes in realtime
  • completely isolate application logic and cluster configurations
  • dump logs to file

Schema Validation for Routes.JSON

Is your feature request related to a problem? Please describe.
Since the routes are attached to the application during runtime, the data in routes.json must be always in a valid format. Currently, the application checks the same immediately before injecting the routes.

Now the RBAC configs are dependent on portions of routes.json (access identifiers), the application needs robust and reliable method to ensure the integrity of the contents of routes.json

Describe the solution you'd like
The idea is to use a JSON-schema-validation library, (particularly AJV) to ensure that routes.json is in the correct format. AJV is chosen as of the commonly available libraries, it is the fastest.

https://i.imgur.com/8ZqZFBB.png

Describe alternatives you've considered
We can use any of the libraries mentioned in the above screenshot.

Additional context
This forms the base for the RBAC mechanism that allows the application to map roles to rights during runtime.

Migrate iiphandler routes to proxyhandler

The proxyHandler didn't work as expected with iip, so the original iiphandler stays, even though it's only being used for proxy now. Discover the issue, and fix it.

Precalculating and Caching some mongo results

Some mongo results take a long time to fetch, don't change often, and don't have much data. We could add in a cache/no-cache case to precalculate results, especially Distinct operations. Inspired by slow calls to get segmentation data.

Fix database connection in database unit tests

Describe the bug

  • before a986e1b, the database connection was made from inside the service itself.
  • with a986e1b into effect, the database connection is initialized inside caracal.js and therefore the unit tests for database service are bound to fail.

To Reproduce

  • clone the repository.
  • checkout the backup-dev branch
  • run mocha test/unit/database.js --exit

Expected behavior

  • the tests should successfully run (if not pass)

Screenshots

  • N/A

Desktop (please complete the following information):

  • Ubuntu 19.10

Smartphone (please complete the following information):

  • N/A

Additional context

  • N/A

Fuzz test and related fixes

Describe the bug
People can, and have, inserted garbage to caMicroscope. While some of this can be resolved by safer rendering, I think we need to avoid this in the database too.

** Actions To take **
Functionally TDD
Fuzz Test and Fixes to Fix Fuzz Test

Cannot Get error in backup-dev branch

Describe the bug
The backup-dev branch had a commit that included a setup_script to set up the application locally using node. When the application was run, the landing page said: "Cannot Get/".

To Reproduce
Steps to reproduce the behavior:

  1. Run the setup_script.sh file
  2. Run npm start
  3. Go to "localhost:4010/"
  4. See the error

Expected behavior
The landing page should be fetched and rendered properly.

Additional context
This problem is due to the fact that the setup_script does not copy the required files to appropriate folders. So, running npm start runs the caracal.js file which later fetches the landing page that does not exist where it should.

Audit Log [discussion]

Log actions which may require an audit (primarily user creation)
What else may be useful in an audit log?

circular dependency warnings

ca-back     | (node:28) Warning: Accessing non-existent property 'count' of module exports inside circular dependency
ca-back     | (Use `node --trace-warnings ...` to show where the warning was created)
ca-back     | (node:28) Warning: Accessing non-existent property 'findOne' of module exports inside circular dependency
ca-back     | (node:28) Warning: Accessing non-existent property 'remove' of module exports inside circular dependency
ca-back     | (node:28) Warning: Accessing non-existent property 'updateOne' of module exports inside circular dependency

@ develop

SCA?

Maybe we should run sca on this repo?

Misleading error message which can cause trouble in debugging

try {
const prikeyPath = './keys/key';
if (fs.existsSync(prikeyPath)) {
PRIKEY = fs.readFileSync(prikeyPath, 'utf8');
} else {
if (DISABLE_SEC || ENABLE_SECURITY_AT && Date.parse(ENABLE_SECURITY_AT) > Date.now()) {
PRIKEY = '';
console.warn('prikey null since DISABLE_SEC and no prikey provided');
} else {
console.error('prikey does not exist');
}
}
} catch (err) {
console.error(err);
}
try {
const pubkeyPath = './keys/key.pub';
if (fs.existsSync(pubkeyPath)) {
var PUBKEY = fs.readFileSync(pubkeyPath, 'utf8');
} else {
if (DISABLE_SEC || ENABLE_SECURITY_AT && Date.parse(ENABLE_SECURITY_AT) > Date.now()) {
PUBKEY = '';
console.warn('pubkey null since DISABLE_SEC and no pubkey provided');
} else {
console.error('pubkey does not exist');
}
}
} catch (err) {
console.error(err);
}

The code block on line 40 and 56 are triggered when DISABLE_SEC || ENABLE_SECURITY_AT && Date.parse(ENABLE_SECURITY_AT) > Date.now() turns false. This has no relation to the files being present or not, whereas the block logs out a message saying XXX does not exist

Segmentations break

Open a slide with segmentations; viewing the segmentations fails.
logs for caracal say

/root/src/node_modules/mongodb/lib/utils.js:133
      throw err;
      ^
TypeError: Cannot read property 'forEach' of null
    at /root/src/handlers/dataHandlers.js:23:20
    at /root/src/node_modules/mongodb/lib/operations/execute_operation.js:76:14
    at executeCallback (/root/src/node_modules/mongodb/lib/operations/execute_operation.js:67:25)
    at handleCallback (/root/src/node_modules/mongodb/lib/utils.js:129:55)
    at /root/src/node_modules/mongodb/lib/operations/to_array.js:30:40
    at ClientSession.endSession (/root/src/node_modules/mongodb/lib/core/sessions.js:135:41)
    at Cursor._endSession (/root/src/node_modules/mongodb/lib/core/cursor.js:399:15)
    at /root/src/node_modules/mongodb/lib/operations/to_array.js:30:22
    at /root/src/node_modules/mongodb/lib/core/cursor.js:750:9
    at done (/root/src/node_modules/mongodb/lib/core/cursor.js:463:7)

Issue with the setup script

Describe the bug
I was following the instructions on using setup script to initialize the project. I have the Distro, Caracal, and caMicroscope repositories in the same parent folder. When I run "bash ./setup_script.sh", I get an error saying the mongo path was not found while I have set the path inside environment variables.

To Reproduce
Steps to reproduce the behavior:

  1. Open Git bash
  2. Navigate to the Caracal folder which has the "setup_script.sh" file
  3. Run the script with "bash ./setup_script.sh"
  4. See the error

Expected behavior
The script must run smoothly and start the application

Screenshots
The error:
mongoPathError

My environment variables window:
env variables

System information:

  • Device: LENOVO_MT_81DE_BU_idea_FM_ideapad 330-15IKB
  • Processor: Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz, 1800 Mhz, 4 Core(s), 8 Logical Processor(s)
  • OS: Microsoft Windows 10 Home
  • Browser: Chrome
  • Version: 10.0.19041 Build 19041

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.