{
"FileHashEncoding": "zlib",
"data_date": 1657231001,
"digest": "sha256:fa4b861d9ef72bb594ee6546f2356ed871e5c585e9306de92a4cf54fc",
"function_metadata": {},
"image": "HIDDEN",
"image_id": 13496,
"image_size": 875346670,
"initiating_user": "scheduler",
"internal_digest_id": {
"id": 13857
},
"os": "rhel",
"previous_digest": "sha256:fa4b861d9ef72bb594ee6546f2356ed871e5c585e9306de92a4cf54fc",
"pull_name": "HIDDEN",
"pull_skipped": true,
"registry": "HIDDEN",
"required_image_platform": "amd64:::",
"resources": [{
"resource": {
"arch": "x86_64",
"cpe": "pkg:/rhel:8.5:pcre2:10.32-2.el8",
"format": "rpm",
"issue_type": "{}",
"layer_digest": "sha256:54e56e6f85721741ee7bf0336de8ad3bf138a56769a6d0097b600",
"license": "BSD",
"name": "pcre2",
"sensitive_name": "{}",
"src_name": "pcre2",
"src_version": "10.32-2.el8",
"version": "10.32-2.el8"
},
"scanned": true,
"vulnerabilities": [{
"already_acknowledged": true,
"aqua_score": 7.1,
"aqua_score_classification": "Vendor CVSS V3 Score: 7.1",
"aqua_scoring_system": "CVSS V3",
"aqua_severity": "medium",
"aqua_severity_classification": "Vendor Severity: moderate",
"aqua_vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"description": "An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.",
"fix_version": "any in rhel 9",
"heuristic_ref_id": 2179679,
"modification_date": "2022-06-02",
"name": "CVE-2022-1586",
"nvd_score": 6.4,
"nvd_score_v3": 9.1,
"nvd_score_version": "CVSS v2",
"nvd_severity": "medium",
"nvd_severity_v3": "critical",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1586",
"nvd_vectors": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"nvd_vectors_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"publish_date": "2022-05-16",
"solution": "Upgrade operating system to rhel version 9 (includes fixed versions of pcre2)",
"vendor_score_v3": 7.1,
"vendor_score_version": "CVSS v2",
"vendor_severity": "moderate",
"vendor_url": "https://access.redhat.com/security/cve/CVE-2022-1586",
"vendor_vectors_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
}]
},
{
"resource": {
"arch": "x86_64",
"cpe": "pkg:/rhel:8.5:unzip:6.0-45.el8_4",
"format": "rpm",
"issue_type": "{}",
"layer_digest": "sha256:7d53446fc2f86b9129c8e42438d860ad572982eb28d61b58697fb7682274e252",
"license": "BSD",
"name": "unzip",
"sensitive_name": "{}",
"src_name": "unzip",
"src_version": "6.0-45.el8_4",
"version": "6.0-45.el8_4"
},
"scanned": true,
"vulnerabilities": [{
"aqua_score": 5.5,
"aqua_score_classification": "Vendor CVSS V3 Score: 5.5",
"aqua_scoring_system": "CVSS V3",
"aqua_severity": "low",
"aqua_severity_classification": "Vendor Severity: low",
"aqua_vectors": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"description": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
"fix_version": "any in rhel 9",
"heuristic_ref_id": 2015547,
"modification_date": "2022-05-17",
"name": "CVE-2022-0530",
"nvd_score": 4.3,
"nvd_score_v3": 5.5,
"nvd_score_version": "CVSS v2",
"nvd_severity": "medium",
"nvd_severity_v3": "medium",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530",
"nvd_vectors": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"nvd_vectors_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"publish_date": "2022-02-09",
"solution": "Upgrade operating system to rhel version 9 (includes fixed versions of unzip)",
"vendor_score_v3": 5.5,
"vendor_score_version": "CVSS v2",
"vendor_severity": "low",
"vendor_statement": "This package is affected by this flaw on this platform, but there is currently no intention to fix it",
"vendor_url": "https://access.redhat.com/security/cve/CVE-2022-0530",
"vendor_vectors_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
}]
}
]
}
... View more