· 6 years ago · Dec 20, 2019, 10:12 PM
1{
2 "manifest_hash": "2f077db56abccc19f16f140f629ae98e904b4b7d563957a7fc319bd11b82ba36",
3 "packages": {
4 "100": {
5 "id": 100,
6 "name": "libunistring2",
7 "version": "0.9.9-0ubuntu2",
8 "kind": "binary",
9 "source": {
10 "id": 99,
11 "name": "libunistring",
12 "version": "0.9.9-0ubuntu2",
13 "kind": "source"
14 }
15 },
16 "102": {
17 "id": 102,
18 "name": "libnettle6",
19 "version": "3.4-1",
20 "kind": "binary",
21 "source": {
22 "id": 101,
23 "name": "nettle",
24 "version": "3.4-1",
25 "kind": "source"
26 }
27 },
28 "104": {
29 "id": 104,
30 "name": "libattr1",
31 "version": "1:2.4.47-2build1",
32 "kind": "binary",
33 "source": {
34 "id": 103,
35 "name": "attr",
36 "version": "1:2.4.47-2build1",
37 "kind": "source"
38 }
39 },
40 "106": {
41 "id": 106,
42 "name": "libss2",
43 "version": "1.44.1-1ubuntu1.1",
44 "kind": "binary",
45 "source": {
46 "id": 87,
47 "name": "e2fsprogs",
48 "version": "1.44.1-1ubuntu1.1",
49 "kind": "source"
50 }
51 },
52 "108": {
53 "id": 108,
54 "name": "liblzma5",
55 "version": "5.2.2-1.3",
56 "kind": "binary",
57 "source": {
58 "id": 107,
59 "name": "xz-utils",
60 "version": "5.2.2-1.3",
61 "kind": "source"
62 }
63 },
64 "110": {
65 "id": 110,
66 "name": "libidn2-0",
67 "version": "2.0.4-1.1build2",
68 "kind": "binary",
69 "source": {
70 "id": 109,
71 "name": "libidn2",
72 "version": "2.0.4-1.1build2",
73 "kind": "source"
74 }
75 },
76 "112": {
77 "id": 112,
78 "name": "libpam-modules-bin",
79 "version": "1.1.8-3.6ubuntu2.18.04.1",
80 "kind": "binary",
81 "source": {
82 "id": 83,
83 "name": "pam",
84 "version": "1.1.8-3.6ubuntu2.18.04.1",
85 "kind": "source"
86 }
87 },
88 "114": {
89 "id": 114,
90 "name": "grep",
91 "version": "3.1-2",
92 "kind": "binary",
93 "source": {
94 "id": 113,
95 "name": "",
96 "version": ""
97 }
98 },
99 "116": {
100 "id": 116,
101 "name": "base-passwd",
102 "version": "3.5.44",
103 "kind": "binary",
104 "source": {
105 "id": 113,
106 "name": "",
107 "version": ""
108 }
109 },
110 "118": {
111 "id": 118,
112 "name": "liblz4-1",
113 "version": "0.0~r131-2ubuntu3",
114 "kind": "binary",
115 "source": {
116 "id": 117,
117 "name": "lz4",
118 "version": "0.0~r131-2ubuntu3",
119 "kind": "source"
120 }
121 },
122 "120": {
123 "id": 120,
124 "name": "debianutils",
125 "version": "4.8.4",
126 "kind": "binary",
127 "source": {
128 "id": 113,
129 "name": "",
130 "version": ""
131 }
132 },
133 "122": {
134 "id": 122,
135 "name": "libgcrypt20",
136 "version": "1.8.1-4ubuntu1.1",
137 "kind": "binary",
138 "source": {
139 "id": 113,
140 "name": "",
141 "version": ""
142 }
143 },
144 "124": {
145 "id": 124,
146 "name": "libncursesw5",
147 "version": "6.1-1ubuntu1.18.04",
148 "kind": "binary",
149 "source": {
150 "id": 85,
151 "name": "ncurses",
152 "version": "6.1-1ubuntu1.18.04",
153 "kind": "source"
154 }
155 },
156 "126": {
157 "id": 126,
158 "name": "bash",
159 "version": "4.4.18-2ubuntu1.2",
160 "kind": "binary",
161 "source": {
162 "id": 113,
163 "name": "",
164 "version": ""
165 }
166 },
167 "128": {
168 "id": 128,
169 "name": "libuuid1",
170 "version": "2.31.1-0.4ubuntu3.3",
171 "kind": "binary",
172 "source": {
173 "id": 81,
174 "name": "util-linux",
175 "version": "2.31.1-0.4ubuntu3.3",
176 "kind": "source"
177 }
178 },
179 "130": {
180 "id": 130,
181 "name": "libdb5.3",
182 "version": "5.3.28-13.1ubuntu1.1",
183 "kind": "binary",
184 "source": {
185 "id": 129,
186 "name": "db5.3",
187 "version": "5.3.28-13.1ubuntu1.1",
188 "kind": "source"
189 }
190 },
191 "132": {
192 "id": 132,
193 "name": "debconf",
194 "version": "1.5.66ubuntu1",
195 "kind": "binary",
196 "source": {
197 "id": 113,
198 "name": "",
199 "version": ""
200 }
201 },
202 "134": {
203 "id": 134,
204 "name": "zlib1g",
205 "version": "1:1.2.11.dfsg-0ubuntu2",
206 "kind": "binary",
207 "source": {
208 "id": 133,
209 "name": "zlib",
210 "version": "1:1.2.11.dfsg-0ubuntu2",
211 "kind": "source"
212 }
213 },
214 "136": {
215 "id": 136,
216 "name": "hostname",
217 "version": "3.20",
218 "kind": "binary",
219 "source": {
220 "id": 113,
221 "name": "",
222 "version": ""
223 }
224 },
225 "138": {
226 "id": 138,
227 "name": "mawk",
228 "version": "1.3.3-17ubuntu3",
229 "kind": "binary",
230 "source": {
231 "id": 113,
232 "name": "",
233 "version": ""
234 }
235 },
236 "140": {
237 "id": 140,
238 "name": "gzip",
239 "version": "1.6-5ubuntu1",
240 "kind": "binary",
241 "source": {
242 "id": 113,
243 "name": "",
244 "version": ""
245 }
246 },
247 "142": {
248 "id": 142,
249 "name": "gpgv",
250 "version": "2.2.4-1ubuntu1.2",
251 "kind": "binary",
252 "source": {
253 "id": 141,
254 "name": "gnupg2",
255 "version": "2.2.4-1ubuntu1.2",
256 "kind": "source"
257 }
258 },
259 "144": {
260 "id": 144,
261 "name": "bsdutils",
262 "version": "1:2.31.1-0.4ubuntu3.3",
263 "kind": "binary",
264 "source": {
265 "id": 143,
266 "name": "util-linux (2.31.1-0.4ubuntu3.3)",
267 "version": "1:2.31.1-0.4ubuntu3.3",
268 "kind": "source"
269 }
270 },
271 "146": {
272 "id": 146,
273 "name": "dash",
274 "version": "0.5.8-2.10",
275 "kind": "binary",
276 "source": {
277 "id": 113,
278 "name": "",
279 "version": ""
280 }
281 },
282 "148": {
283 "id": 148,
284 "name": "mount",
285 "version": "2.31.1-0.4ubuntu3.3",
286 "kind": "binary",
287 "source": {
288 "id": 81,
289 "name": "util-linux",
290 "version": "2.31.1-0.4ubuntu3.3",
291 "kind": "source"
292 }
293 },
294 "150": {
295 "id": 150,
296 "name": "libgnutls30",
297 "version": "3.5.18-1ubuntu1.1",
298 "kind": "binary",
299 "source": {
300 "id": 149,
301 "name": "gnutls28",
302 "version": "3.5.18-1ubuntu1.1",
303 "kind": "source"
304 }
305 },
306 "152": {
307 "id": 152,
308 "name": "libsystemd0",
309 "version": "237-3ubuntu10.25",
310 "kind": "binary",
311 "source": {
312 "id": 97,
313 "name": "systemd",
314 "version": "237-3ubuntu10.25",
315 "kind": "source"
316 }
317 },
318 "154": {
319 "id": 154,
320 "name": "libzstd1",
321 "version": "1.3.3+dfsg-2ubuntu1",
322 "kind": "binary",
323 "source": {
324 "id": 153,
325 "name": "libzstd",
326 "version": "1.3.3+dfsg-2ubuntu1",
327 "kind": "source"
328 }
329 },
330 "156": {
331 "id": 156,
332 "name": "libc6",
333 "version": "2.27-3ubuntu1",
334 "kind": "binary",
335 "source": {
336 "id": 155,
337 "name": "glibc",
338 "version": "2.27-3ubuntu1",
339 "kind": "source"
340 }
341 },
342 "158": {
343 "id": 158,
344 "name": "libfdisk1",
345 "version": "2.31.1-0.4ubuntu3.3",
346 "kind": "binary",
347 "source": {
348 "id": 81,
349 "name": "util-linux",
350 "version": "2.31.1-0.4ubuntu3.3",
351 "kind": "source"
352 }
353 },
354 "160": {
355 "id": 160,
356 "name": "libpcre3",
357 "version": "2:8.39-9",
358 "kind": "binary",
359 "source": {
360 "id": 159,
361 "name": "pcre3",
362 "version": "2:8.39-9",
363 "kind": "source"
364 }
365 },
366 "162": {
367 "id": 162,
368 "name": "coreutils",
369 "version": "8.28-1ubuntu1",
370 "kind": "binary",
371 "source": {
372 "id": 113,
373 "name": "",
374 "version": ""
375 }
376 },
377 "164": {
378 "id": 164,
379 "name": "e2fsprogs",
380 "version": "1.44.1-1ubuntu1.1",
381 "kind": "binary",
382 "source": {
383 "id": 113,
384 "name": "",
385 "version": ""
386 }
387 },
388 "166": {
389 "id": 166,
390 "name": "tar",
391 "version": "1.29b-2ubuntu0.1",
392 "kind": "binary",
393 "source": {
394 "id": 113,
395 "name": "",
396 "version": ""
397 }
398 },
399 "168": {
400 "id": 168,
401 "name": "libprocps6",
402 "version": "2:3.3.12-3ubuntu1.1",
403 "kind": "binary",
404 "source": {
405 "id": 167,
406 "name": "procps",
407 "version": "2:3.3.12-3ubuntu1.1",
408 "kind": "source"
409 }
410 },
411 "170": {
412 "id": 170,
413 "name": "libbz2-1.0",
414 "version": "1.0.6-8.1ubuntu0.2",
415 "kind": "binary",
416 "source": {
417 "id": 169,
418 "name": "bzip2",
419 "version": "1.0.6-8.1ubuntu0.2",
420 "kind": "source"
421 }
422 },
423 "172": {
424 "id": 172,
425 "name": "libblkid1",
426 "version": "2.31.1-0.4ubuntu3.3",
427 "kind": "binary",
428 "source": {
429 "id": 81,
430 "name": "util-linux",
431 "version": "2.31.1-0.4ubuntu3.3",
432 "kind": "source"
433 }
434 },
435 "174": {
436 "id": 174,
437 "name": "libtasn1-6",
438 "version": "4.13-2",
439 "kind": "binary",
440 "source": {
441 "id": 113,
442 "name": "",
443 "version": ""
444 }
445 },
446 "176": {
447 "id": 176,
448 "name": "bzip2",
449 "version": "1.0.6-8.1ubuntu0.2",
450 "kind": "binary",
451 "source": {
452 "id": 113,
453 "name": "",
454 "version": ""
455 }
456 },
457 "178": {
458 "id": 178,
459 "name": "libhogweed4",
460 "version": "3.4-1",
461 "kind": "binary",
462 "source": {
463 "id": 101,
464 "name": "nettle",
465 "version": "3.4-1",
466 "kind": "source"
467 }
468 },
469 "180": {
470 "id": 180,
471 "name": "lsb-base",
472 "version": "9.20170808ubuntu1",
473 "kind": "binary",
474 "source": {
475 "id": 179,
476 "name": "lsb",
477 "version": "9.20170808ubuntu1",
478 "kind": "source"
479 }
480 },
481 "182": {
482 "id": 182,
483 "name": "procps",
484 "version": "2:3.3.12-3ubuntu1.1",
485 "kind": "binary",
486 "source": {
487 "id": 113,
488 "name": "",
489 "version": ""
490 }
491 },
492 "184": {
493 "id": 184,
494 "name": "libgpg-error0",
495 "version": "1.27-6",
496 "kind": "binary",
497 "source": {
498 "id": 183,
499 "name": "libgpg-error",
500 "version": "1.27-6",
501 "kind": "source"
502 }
503 },
504 "186": {
505 "id": 186,
506 "name": "base-files",
507 "version": "10.1ubuntu2.6",
508 "kind": "binary",
509 "source": {
510 "id": 113,
511 "name": "",
512 "version": ""
513 }
514 },
515 "188": {
516 "id": 188,
517 "name": "libgmp10",
518 "version": "2:6.1.2+dfsg-2",
519 "kind": "binary",
520 "source": {
521 "id": 187,
522 "name": "gmp",
523 "version": "2:6.1.2+dfsg-2",
524 "kind": "source"
525 }
526 },
527 "190": {
528 "id": 190,
529 "name": "sensible-utils",
530 "version": "0.0.12",
531 "kind": "binary",
532 "source": {
533 "id": 113,
534 "name": "",
535 "version": ""
536 }
537 },
538 "192": {
539 "id": 192,
540 "name": "passwd",
541 "version": "1:4.5-1ubuntu2",
542 "kind": "binary",
543 "source": {
544 "id": 191,
545 "name": "shadow",
546 "version": "1:4.5-1ubuntu2",
547 "kind": "source"
548 }
549 },
550 "194": {
551 "id": 194,
552 "name": "init-system-helpers",
553 "version": "1.51",
554 "kind": "binary",
555 "source": {
556 "id": 113,
557 "name": "",
558 "version": ""
559 }
560 },
561 "196": {
562 "id": 196,
563 "name": "ncurses-base",
564 "version": "6.1-1ubuntu1.18.04",
565 "kind": "binary",
566 "source": {
567 "id": 85,
568 "name": "ncurses",
569 "version": "6.1-1ubuntu1.18.04",
570 "kind": "source"
571 }
572 },
573 "198": {
574 "id": 198,
575 "name": "libc-bin",
576 "version": "2.27-3ubuntu1",
577 "kind": "binary",
578 "source": {
579 "id": 155,
580 "name": "glibc",
581 "version": "2.27-3ubuntu1",
582 "kind": "source"
583 }
584 },
585 "200": {
586 "id": 200,
587 "name": "libsemanage1",
588 "version": "2.7-2build2",
589 "kind": "binary",
590 "source": {
591 "id": 199,
592 "name": "libsemanage",
593 "version": "2.7-2build2",
594 "kind": "source"
595 }
596 },
597 "202": {
598 "id": 202,
599 "name": "libseccomp2",
600 "version": "2.4.1-0ubuntu0.18.04.2",
601 "kind": "binary",
602 "source": {
603 "id": 201,
604 "name": "libseccomp",
605 "version": "2.4.1-0ubuntu0.18.04.2",
606 "kind": "source"
607 }
608 },
609 "204": {
610 "id": 204,
611 "name": "sysvinit-utils",
612 "version": "2.88dsf-59.10ubuntu1",
613 "kind": "binary",
614 "source": {
615 "id": 203,
616 "name": "sysvinit",
617 "version": "2.88dsf-59.10ubuntu1",
618 "kind": "source"
619 }
620 },
621 "206": {
622 "id": 206,
623 "name": "libsemanage-common",
624 "version": "2.7-2build2",
625 "kind": "binary",
626 "source": {
627 "id": 199,
628 "name": "libsemanage",
629 "version": "2.7-2build2",
630 "kind": "source"
631 }
632 },
633 "208": {
634 "id": 208,
635 "name": "libp11-kit0",
636 "version": "0.23.9-2",
637 "kind": "binary",
638 "source": {
639 "id": 207,
640 "name": "p11-kit",
641 "version": "0.23.9-2",
642 "kind": "source"
643 }
644 },
645 "210": {
646 "id": 210,
647 "name": "libdebconfclient0",
648 "version": "0.213ubuntu1",
649 "kind": "binary",
650 "source": {
651 "id": 209,
652 "name": "cdebconf",
653 "version": "0.213ubuntu1",
654 "kind": "source"
655 }
656 },
657 "212": {
658 "id": 212,
659 "name": "libselinux1",
660 "version": "2.7-2build2",
661 "kind": "binary",
662 "source": {
663 "id": 211,
664 "name": "libselinux",
665 "version": "2.7-2build2",
666 "kind": "source"
667 }
668 },
669 "214": {
670 "id": 214,
671 "name": "dpkg",
672 "version": "1.19.0.5ubuntu2.1",
673 "kind": "binary",
674 "source": {
675 "id": 113,
676 "name": "",
677 "version": ""
678 }
679 },
680 "216": {
681 "id": 216,
682 "name": "gcc-8-base",
683 "version": "8.3.0-6ubuntu1~18.04.1",
684 "kind": "binary",
685 "source": {
686 "id": 215,
687 "name": "gcc-8",
688 "version": "8.3.0-6ubuntu1~18.04.1",
689 "kind": "source"
690 }
691 },
692 "218": {
693 "id": 218,
694 "name": "apt",
695 "version": "1.6.11",
696 "kind": "binary",
697 "source": {
698 "id": 113,
699 "name": "",
700 "version": ""
701 }
702 },
703 "220": {
704 "id": 220,
705 "name": "diffutils",
706 "version": "1:3.6-1",
707 "kind": "binary",
708 "source": {
709 "id": 113,
710 "name": "",
711 "version": ""
712 }
713 },
714 "222": {
715 "id": 222,
716 "name": "libpam-modules",
717 "version": "1.1.8-3.6ubuntu2.18.04.1",
718 "kind": "binary",
719 "source": {
720 "id": 83,
721 "name": "pam",
722 "version": "1.1.8-3.6ubuntu2.18.04.1",
723 "kind": "source"
724 }
725 },
726 "224": {
727 "id": 224,
728 "name": "libstdc++6",
729 "version": "8.3.0-6ubuntu1~18.04.1",
730 "kind": "binary",
731 "source": {
732 "id": 215,
733 "name": "gcc-8",
734 "version": "8.3.0-6ubuntu1~18.04.1",
735 "kind": "source"
736 }
737 },
738 "226": {
739 "id": 226,
740 "name": "libffi6",
741 "version": "3.2.1-8",
742 "kind": "binary",
743 "source": {
744 "id": 225,
745 "name": "libffi",
746 "version": "3.2.1-8",
747 "kind": "source"
748 }
749 },
750 "228": {
751 "id": 228,
752 "name": "libaudit-common",
753 "version": "1:2.8.2-1ubuntu1",
754 "kind": "binary",
755 "source": {
756 "id": 91,
757 "name": "audit",
758 "version": "1:2.8.2-1ubuntu1",
759 "kind": "source"
760 }
761 },
762 "230": {
763 "id": 230,
764 "name": "findutils",
765 "version": "4.6.0+git+20170828-2",
766 "kind": "binary",
767 "source": {
768 "id": 113,
769 "name": "",
770 "version": ""
771 }
772 },
773 "232": {
774 "id": 232,
775 "name": "libpam0g",
776 "version": "1.1.8-3.6ubuntu2.18.04.1",
777 "kind": "binary",
778 "source": {
779 "id": 83,
780 "name": "pam",
781 "version": "1.1.8-3.6ubuntu2.18.04.1",
782 "kind": "source"
783 }
784 },
785 "234": {
786 "id": 234,
787 "name": "libcap-ng0",
788 "version": "0.7.7-3.1",
789 "kind": "binary",
790 "source": {
791 "id": 233,
792 "name": "libcap-ng",
793 "version": "0.7.7-3.1",
794 "kind": "source"
795 }
796 },
797 "236": {
798 "id": 236,
799 "name": "libmount1",
800 "version": "2.31.1-0.4ubuntu3.3",
801 "kind": "binary",
802 "source": {
803 "id": 81,
804 "name": "util-linux",
805 "version": "2.31.1-0.4ubuntu3.3",
806 "kind": "source"
807 }
808 },
809 "238": {
810 "id": 238,
811 "name": "login",
812 "version": "1:4.5-1ubuntu2",
813 "kind": "binary",
814 "source": {
815 "id": 191,
816 "name": "shadow",
817 "version": "1:4.5-1ubuntu2",
818 "kind": "source"
819 }
820 },
821 "240": {
822 "id": 240,
823 "name": "adduser",
824 "version": "3.116ubuntu1",
825 "kind": "binary",
826 "source": {
827 "id": 113,
828 "name": "",
829 "version": ""
830 }
831 },
832 "242": {
833 "id": 242,
834 "name": "libext2fs2",
835 "version": "1.44.1-1ubuntu1.1",
836 "kind": "binary",
837 "source": {
838 "id": 87,
839 "name": "e2fsprogs",
840 "version": "1.44.1-1ubuntu1.1",
841 "kind": "source"
842 }
843 },
844 "244": {
845 "id": 244,
846 "name": "libacl1",
847 "version": "2.2.52-3build1",
848 "kind": "binary",
849 "source": {
850 "id": 243,
851 "name": "acl",
852 "version": "2.2.52-3build1",
853 "kind": "source"
854 }
855 },
856 "246": {
857 "id": 246,
858 "name": "ncurses-bin",
859 "version": "6.1-1ubuntu1.18.04",
860 "kind": "binary",
861 "source": {
862 "id": 85,
863 "name": "ncurses",
864 "version": "6.1-1ubuntu1.18.04",
865 "kind": "source"
866 }
867 },
868 "248": {
869 "id": 248,
870 "name": "libsepol1",
871 "version": "2.7-1",
872 "kind": "binary",
873 "source": {
874 "id": 247,
875 "name": "libsepol",
876 "version": "2.7-1",
877 "kind": "source"
878 }
879 },
880 "250": {
881 "id": 250,
882 "name": "ubuntu-keyring",
883 "version": "2018.09.18.1~18.04.0",
884 "kind": "binary",
885 "source": {
886 "id": 113,
887 "name": "",
888 "version": ""
889 }
890 },
891 "252": {
892 "id": 252,
893 "name": "libgcc1",
894 "version": "1:8.3.0-6ubuntu1~18.04.1",
895 "kind": "binary",
896 "source": {
897 "id": 251,
898 "name": "gcc-8 (8.3.0-6ubuntu1~18.04.1)",
899 "version": "1:8.3.0-6ubuntu1~18.04.1",
900 "kind": "source"
901 }
902 },
903 "254": {
904 "id": 254,
905 "name": "util-linux",
906 "version": "2.31.1-0.4ubuntu3.3",
907 "kind": "binary",
908 "source": {
909 "id": 113,
910 "name": "",
911 "version": ""
912 }
913 },
914 "256": {
915 "id": 256,
916 "name": "sed",
917 "version": "4.4-2",
918 "kind": "binary",
919 "source": {
920 "id": 113,
921 "name": "",
922 "version": ""
923 }
924 },
925 "258": {
926 "id": 258,
927 "name": "libsmartcols1",
928 "version": "2.31.1-0.4ubuntu3.3",
929 "kind": "binary",
930 "source": {
931 "id": 81,
932 "name": "util-linux",
933 "version": "2.31.1-0.4ubuntu3.3",
934 "kind": "source"
935 }
936 },
937 "82": {
938 "id": 82,
939 "name": "fdisk",
940 "version": "2.31.1-0.4ubuntu3.3",
941 "kind": "binary",
942 "source": {
943 "id": 81,
944 "name": "util-linux",
945 "version": "2.31.1-0.4ubuntu3.3",
946 "kind": "source"
947 }
948 },
949 "84": {
950 "id": 84,
951 "name": "libpam-runtime",
952 "version": "1.1.8-3.6ubuntu2.18.04.1",
953 "kind": "binary",
954 "source": {
955 "id": 83,
956 "name": "pam",
957 "version": "1.1.8-3.6ubuntu2.18.04.1",
958 "kind": "source"
959 }
960 },
961 "86": {
962 "id": 86,
963 "name": "libncurses5",
964 "version": "6.1-1ubuntu1.18.04",
965 "kind": "binary",
966 "source": {
967 "id": 85,
968 "name": "ncurses",
969 "version": "6.1-1ubuntu1.18.04",
970 "kind": "source"
971 }
972 },
973 "88": {
974 "id": 88,
975 "name": "libcom-err2",
976 "version": "1.44.1-1ubuntu1.1",
977 "kind": "binary",
978 "source": {
979 "id": 87,
980 "name": "e2fsprogs",
981 "version": "1.44.1-1ubuntu1.1",
982 "kind": "source"
983 }
984 },
985 "90": {
986 "id": 90,
987 "name": "libapt-pkg5.0",
988 "version": "1.6.11",
989 "kind": "binary",
990 "source": {
991 "id": 89,
992 "name": "apt",
993 "version": "1.6.11",
994 "kind": "source"
995 }
996 },
997 "92": {
998 "id": 92,
999 "name": "libaudit1",
1000 "version": "1:2.8.2-1ubuntu1",
1001 "kind": "binary",
1002 "source": {
1003 "id": 91,
1004 "name": "audit",
1005 "version": "1:2.8.2-1ubuntu1",
1006 "kind": "source"
1007 }
1008 },
1009 "94": {
1010 "id": 94,
1011 "name": "libtinfo5",
1012 "version": "6.1-1ubuntu1.18.04",
1013 "kind": "binary",
1014 "source": {
1015 "id": 85,
1016 "name": "ncurses",
1017 "version": "6.1-1ubuntu1.18.04",
1018 "kind": "source"
1019 }
1020 },
1021 "96": {
1022 "id": 96,
1023 "name": "perl-base",
1024 "version": "5.26.1-6ubuntu0.3",
1025 "kind": "binary",
1026 "source": {
1027 "id": 95,
1028 "name": "perl",
1029 "version": "5.26.1-6ubuntu0.3",
1030 "kind": "source"
1031 }
1032 },
1033 "98": {
1034 "id": 98,
1035 "name": "libudev1",
1036 "version": "237-3ubuntu10.25",
1037 "kind": "binary",
1038 "source": {
1039 "id": 97,
1040 "name": "systemd",
1041 "version": "237-3ubuntu10.25",
1042 "kind": "source"
1043 }
1044 }
1045 },
1046 "distributions": {
1047 "2": {
1048 "id": 2,
1049 "did": "ubuntu",
1050 "name": "Ubuntu",
1051 "version": "18.04.3 LTS (Bionic Beaver)",
1052 "version_code_name": "bionic",
1053 "version_id": "18.04",
1054 "arch": "",
1055 "cpe": "",
1056 "pretty_name": "Ubuntu 18.04.3 LTS"
1057 }
1058 },
1059 "repository": {},
1060 "environments": {
1061 "100": [{
1062 "package_db": "var/lib/dpkg/status",
1063 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1064 "distribution_id": 2,
1065 "repository_id": 0
1066 }],
1067 "102": [{
1068 "package_db": "var/lib/dpkg/status",
1069 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1070 "distribution_id": 2,
1071 "repository_id": 0
1072 }],
1073 "104": [{
1074 "package_db": "var/lib/dpkg/status",
1075 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1076 "distribution_id": 2,
1077 "repository_id": 0
1078 }],
1079 "106": [{
1080 "package_db": "var/lib/dpkg/status",
1081 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1082 "distribution_id": 2,
1083 "repository_id": 0
1084 }],
1085 "108": [{
1086 "package_db": "var/lib/dpkg/status",
1087 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1088 "distribution_id": 2,
1089 "repository_id": 0
1090 }],
1091 "110": [{
1092 "package_db": "var/lib/dpkg/status",
1093 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1094 "distribution_id": 2,
1095 "repository_id": 0
1096 }],
1097 "112": [{
1098 "package_db": "var/lib/dpkg/status",
1099 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1100 "distribution_id": 2,
1101 "repository_id": 0
1102 }],
1103 "114": [{
1104 "package_db": "var/lib/dpkg/status",
1105 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1106 "distribution_id": 2,
1107 "repository_id": 0
1108 }],
1109 "116": [{
1110 "package_db": "var/lib/dpkg/status",
1111 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1112 "distribution_id": 2,
1113 "repository_id": 0
1114 }],
1115 "118": [{
1116 "package_db": "var/lib/dpkg/status",
1117 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1118 "distribution_id": 2,
1119 "repository_id": 0
1120 }],
1121 "120": [{
1122 "package_db": "var/lib/dpkg/status",
1123 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1124 "distribution_id": 2,
1125 "repository_id": 0
1126 }],
1127 "122": [{
1128 "package_db": "var/lib/dpkg/status",
1129 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1130 "distribution_id": 2,
1131 "repository_id": 0
1132 }],
1133 "124": [{
1134 "package_db": "var/lib/dpkg/status",
1135 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1136 "distribution_id": 2,
1137 "repository_id": 0
1138 }],
1139 "126": [{
1140 "package_db": "var/lib/dpkg/status",
1141 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1142 "distribution_id": 2,
1143 "repository_id": 0
1144 }],
1145 "128": [{
1146 "package_db": "var/lib/dpkg/status",
1147 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1148 "distribution_id": 2,
1149 "repository_id": 0
1150 }],
1151 "130": [{
1152 "package_db": "var/lib/dpkg/status",
1153 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1154 "distribution_id": 2,
1155 "repository_id": 0
1156 }],
1157 "132": [{
1158 "package_db": "var/lib/dpkg/status",
1159 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1160 "distribution_id": 2,
1161 "repository_id": 0
1162 }],
1163 "134": [{
1164 "package_db": "var/lib/dpkg/status",
1165 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1166 "distribution_id": 2,
1167 "repository_id": 0
1168 }],
1169 "136": [{
1170 "package_db": "var/lib/dpkg/status",
1171 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1172 "distribution_id": 2,
1173 "repository_id": 0
1174 }],
1175 "138": [{
1176 "package_db": "var/lib/dpkg/status",
1177 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1178 "distribution_id": 2,
1179 "repository_id": 0
1180 }],
1181 "140": [{
1182 "package_db": "var/lib/dpkg/status",
1183 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1184 "distribution_id": 2,
1185 "repository_id": 0
1186 }],
1187 "142": [{
1188 "package_db": "var/lib/dpkg/status",
1189 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1190 "distribution_id": 2,
1191 "repository_id": 0
1192 }],
1193 "144": [{
1194 "package_db": "var/lib/dpkg/status",
1195 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1196 "distribution_id": 2,
1197 "repository_id": 0
1198 }],
1199 "146": [{
1200 "package_db": "var/lib/dpkg/status",
1201 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1202 "distribution_id": 2,
1203 "repository_id": 0
1204 }],
1205 "148": [{
1206 "package_db": "var/lib/dpkg/status",
1207 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1208 "distribution_id": 2,
1209 "repository_id": 0
1210 }],
1211 "150": [{
1212 "package_db": "var/lib/dpkg/status",
1213 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1214 "distribution_id": 2,
1215 "repository_id": 0
1216 }],
1217 "152": [{
1218 "package_db": "var/lib/dpkg/status",
1219 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1220 "distribution_id": 2,
1221 "repository_id": 0
1222 }],
1223 "154": [{
1224 "package_db": "var/lib/dpkg/status",
1225 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1226 "distribution_id": 2,
1227 "repository_id": 0
1228 }],
1229 "156": [{
1230 "package_db": "var/lib/dpkg/status",
1231 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1232 "distribution_id": 2,
1233 "repository_id": 0
1234 }],
1235 "158": [{
1236 "package_db": "var/lib/dpkg/status",
1237 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1238 "distribution_id": 2,
1239 "repository_id": 0
1240 }],
1241 "160": [{
1242 "package_db": "var/lib/dpkg/status",
1243 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1244 "distribution_id": 2,
1245 "repository_id": 0
1246 }],
1247 "162": [{
1248 "package_db": "var/lib/dpkg/status",
1249 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1250 "distribution_id": 2,
1251 "repository_id": 0
1252 }],
1253 "164": [{
1254 "package_db": "var/lib/dpkg/status",
1255 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1256 "distribution_id": 2,
1257 "repository_id": 0
1258 }],
1259 "166": [{
1260 "package_db": "var/lib/dpkg/status",
1261 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1262 "distribution_id": 2,
1263 "repository_id": 0
1264 }],
1265 "168": [{
1266 "package_db": "var/lib/dpkg/status",
1267 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1268 "distribution_id": 2,
1269 "repository_id": 0
1270 }],
1271 "170": [{
1272 "package_db": "var/lib/dpkg/status",
1273 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1274 "distribution_id": 2,
1275 "repository_id": 0
1276 }],
1277 "172": [{
1278 "package_db": "var/lib/dpkg/status",
1279 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1280 "distribution_id": 2,
1281 "repository_id": 0
1282 }],
1283 "174": [{
1284 "package_db": "var/lib/dpkg/status",
1285 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1286 "distribution_id": 2,
1287 "repository_id": 0
1288 }],
1289 "176": [{
1290 "package_db": "var/lib/dpkg/status",
1291 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1292 "distribution_id": 2,
1293 "repository_id": 0
1294 }],
1295 "178": [{
1296 "package_db": "var/lib/dpkg/status",
1297 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1298 "distribution_id": 2,
1299 "repository_id": 0
1300 }],
1301 "180": [{
1302 "package_db": "var/lib/dpkg/status",
1303 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1304 "distribution_id": 2,
1305 "repository_id": 0
1306 }],
1307 "182": [{
1308 "package_db": "var/lib/dpkg/status",
1309 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1310 "distribution_id": 2,
1311 "repository_id": 0
1312 }],
1313 "184": [{
1314 "package_db": "var/lib/dpkg/status",
1315 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1316 "distribution_id": 2,
1317 "repository_id": 0
1318 }],
1319 "186": [{
1320 "package_db": "var/lib/dpkg/status",
1321 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1322 "distribution_id": 2,
1323 "repository_id": 0
1324 }],
1325 "188": [{
1326 "package_db": "var/lib/dpkg/status",
1327 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1328 "distribution_id": 2,
1329 "repository_id": 0
1330 }],
1331 "190": [{
1332 "package_db": "var/lib/dpkg/status",
1333 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1334 "distribution_id": 2,
1335 "repository_id": 0
1336 }],
1337 "192": [{
1338 "package_db": "var/lib/dpkg/status",
1339 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1340 "distribution_id": 2,
1341 "repository_id": 0
1342 }],
1343 "194": [{
1344 "package_db": "var/lib/dpkg/status",
1345 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1346 "distribution_id": 2,
1347 "repository_id": 0
1348 }],
1349 "196": [{
1350 "package_db": "var/lib/dpkg/status",
1351 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1352 "distribution_id": 2,
1353 "repository_id": 0
1354 }],
1355 "198": [{
1356 "package_db": "var/lib/dpkg/status",
1357 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1358 "distribution_id": 2,
1359 "repository_id": 0
1360 }],
1361 "200": [{
1362 "package_db": "var/lib/dpkg/status",
1363 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1364 "distribution_id": 2,
1365 "repository_id": 0
1366 }],
1367 "202": [{
1368 "package_db": "var/lib/dpkg/status",
1369 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1370 "distribution_id": 2,
1371 "repository_id": 0
1372 }],
1373 "204": [{
1374 "package_db": "var/lib/dpkg/status",
1375 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1376 "distribution_id": 2,
1377 "repository_id": 0
1378 }],
1379 "206": [{
1380 "package_db": "var/lib/dpkg/status",
1381 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1382 "distribution_id": 2,
1383 "repository_id": 0
1384 }],
1385 "208": [{
1386 "package_db": "var/lib/dpkg/status",
1387 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1388 "distribution_id": 2,
1389 "repository_id": 0
1390 }],
1391 "210": [{
1392 "package_db": "var/lib/dpkg/status",
1393 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1394 "distribution_id": 2,
1395 "repository_id": 0
1396 }],
1397 "212": [{
1398 "package_db": "var/lib/dpkg/status",
1399 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1400 "distribution_id": 2,
1401 "repository_id": 0
1402 }],
1403 "214": [{
1404 "package_db": "var/lib/dpkg/status",
1405 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1406 "distribution_id": 2,
1407 "repository_id": 0
1408 }],
1409 "216": [{
1410 "package_db": "var/lib/dpkg/status",
1411 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1412 "distribution_id": 2,
1413 "repository_id": 0
1414 }],
1415 "218": [{
1416 "package_db": "var/lib/dpkg/status",
1417 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1418 "distribution_id": 2,
1419 "repository_id": 0
1420 }],
1421 "220": [{
1422 "package_db": "var/lib/dpkg/status",
1423 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1424 "distribution_id": 2,
1425 "repository_id": 0
1426 }],
1427 "222": [{
1428 "package_db": "var/lib/dpkg/status",
1429 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1430 "distribution_id": 2,
1431 "repository_id": 0
1432 }],
1433 "224": [{
1434 "package_db": "var/lib/dpkg/status",
1435 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1436 "distribution_id": 2,
1437 "repository_id": 0
1438 }],
1439 "226": [{
1440 "package_db": "var/lib/dpkg/status",
1441 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1442 "distribution_id": 2,
1443 "repository_id": 0
1444 }],
1445 "228": [{
1446 "package_db": "var/lib/dpkg/status",
1447 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1448 "distribution_id": 2,
1449 "repository_id": 0
1450 }],
1451 "230": [{
1452 "package_db": "var/lib/dpkg/status",
1453 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1454 "distribution_id": 2,
1455 "repository_id": 0
1456 }],
1457 "232": [{
1458 "package_db": "var/lib/dpkg/status",
1459 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1460 "distribution_id": 2,
1461 "repository_id": 0
1462 }],
1463 "234": [{
1464 "package_db": "var/lib/dpkg/status",
1465 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1466 "distribution_id": 2,
1467 "repository_id": 0
1468 }],
1469 "236": [{
1470 "package_db": "var/lib/dpkg/status",
1471 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1472 "distribution_id": 2,
1473 "repository_id": 0
1474 }],
1475 "238": [{
1476 "package_db": "var/lib/dpkg/status",
1477 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1478 "distribution_id": 2,
1479 "repository_id": 0
1480 }],
1481 "240": [{
1482 "package_db": "var/lib/dpkg/status",
1483 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1484 "distribution_id": 2,
1485 "repository_id": 0
1486 }],
1487 "242": [{
1488 "package_db": "var/lib/dpkg/status",
1489 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1490 "distribution_id": 2,
1491 "repository_id": 0
1492 }],
1493 "244": [{
1494 "package_db": "var/lib/dpkg/status",
1495 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1496 "distribution_id": 2,
1497 "repository_id": 0
1498 }],
1499 "246": [{
1500 "package_db": "var/lib/dpkg/status",
1501 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1502 "distribution_id": 2,
1503 "repository_id": 0
1504 }],
1505 "248": [{
1506 "package_db": "var/lib/dpkg/status",
1507 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1508 "distribution_id": 2,
1509 "repository_id": 0
1510 }],
1511 "250": [{
1512 "package_db": "var/lib/dpkg/status",
1513 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1514 "distribution_id": 2,
1515 "repository_id": 0
1516 }],
1517 "252": [{
1518 "package_db": "var/lib/dpkg/status",
1519 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1520 "distribution_id": 2,
1521 "repository_id": 0
1522 }],
1523 "254": [{
1524 "package_db": "var/lib/dpkg/status",
1525 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1526 "distribution_id": 2,
1527 "repository_id": 0
1528 }],
1529 "256": [{
1530 "package_db": "var/lib/dpkg/status",
1531 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1532 "distribution_id": 2,
1533 "repository_id": 0
1534 }],
1535 "258": [{
1536 "package_db": "var/lib/dpkg/status",
1537 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1538 "distribution_id": 2,
1539 "repository_id": 0
1540 }],
1541 "82": [{
1542 "package_db": "var/lib/dpkg/status",
1543 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1544 "distribution_id": 2,
1545 "repository_id": 0
1546 }],
1547 "84": [{
1548 "package_db": "var/lib/dpkg/status",
1549 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1550 "distribution_id": 2,
1551 "repository_id": 0
1552 }],
1553 "86": [{
1554 "package_db": "var/lib/dpkg/status",
1555 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1556 "distribution_id": 2,
1557 "repository_id": 0
1558 }],
1559 "88": [{
1560 "package_db": "var/lib/dpkg/status",
1561 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1562 "distribution_id": 2,
1563 "repository_id": 0
1564 }],
1565 "90": [{
1566 "package_db": "var/lib/dpkg/status",
1567 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1568 "distribution_id": 2,
1569 "repository_id": 0
1570 }],
1571 "92": [{
1572 "package_db": "var/lib/dpkg/status",
1573 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1574 "distribution_id": 2,
1575 "repository_id": 0
1576 }],
1577 "94": [{
1578 "package_db": "var/lib/dpkg/status",
1579 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1580 "distribution_id": 2,
1581 "repository_id": 0
1582 }],
1583 "96": [{
1584 "package_db": "var/lib/dpkg/status",
1585 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1586 "distribution_id": 2,
1587 "repository_id": 0
1588 }],
1589 "98": [{
1590 "package_db": "var/lib/dpkg/status",
1591 "introduced_in": "35c102085707f703de2d9eaad8752d6fe1b8f02b5d2149f1d8357c9cc7fb7d0a",
1592 "distribution_id": 2,
1593 "repository_id": 0
1594 }]
1595 },
1596 "vulnerabilities": {
1597 "388754": {
1598 "id": 388754,
1599 "updater": "",
1600 "name": "CVE-2009-5155",
1601 "description": "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.",
1602 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 http://people.canonical.com/~ubuntu-security/cve/2009/CVE-2009-5155.html https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://sourceware.org/bugzilla/show_bug.cgi?id=18986",
1603 "severity": "Low",
1604 "fixed_in_version": "2.28-0ubuntu1"
1605 },
1606 "388757": {
1607 "id": 388757,
1608 "updater": "",
1609 "name": "CVE-2010-3192",
1610 "description": "Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.",
1611 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3192 http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3192.html http://seclists.org/fulldisclosure/2010/Apr/399 https://sourceware.org/ml/libc-alpha/2017-08/msg00010.html http://sourceware.org/bugzilla/show_bug.cgi?id=12189",
1612 "severity": "Low",
1613 "fixed_in_version": "2.28-0ubuntu1"
1614 },
1615 "389424": {
1616 "id": 389424,
1617 "updater": "",
1618 "name": "CVE-2015-8985",
1619 "description": "The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.",
1620 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8985.html https://sourceware.org/bugzilla/show_bug.cgi?id=21163 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392",
1621 "severity": "Low",
1622 "fixed_in_version": "2.28-0ubuntu1"
1623 },
1624 "389741": {
1625 "id": 389741,
1626 "updater": "",
1627 "name": "CVE-2016-2779",
1628 "description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
1629 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2779.html http://www.openwall.com/lists/oss-security/2016/02/27/1 http://marc.info/?l=util-linux-ng&m=145694736107128&w=2 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922 https://bugzilla.redhat.com/show_bug.cgi?id=1312852",
1630 "severity": "Low",
1631 "fixed_in_version": "2.32-0.1ubuntu2"
1632 },
1633 "389970": {
1634 "id": 389970,
1635 "updater": "",
1636 "name": "CVE-2016-5011",
1637 "description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
1638 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5011.html https://bugzilla.redhat.com/show_bug.cgi?id=1349536 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802",
1639 "severity": "Low",
1640 "fixed_in_version": "2.32-0.1ubuntu2"
1641 },
1642 "391657": {
1643 "id": 391657,
1644 "updater": "",
1645 "name": "CVE-2017-18269",
1646 "description": "An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.",
1647 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269 http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18269.html https://github.com/fingolfin/memmove-bug https://sourceware.org/bugzilla/show_bug.cgi?id=22644",
1648 "severity": "Medium",
1649 "fixed_in_version": "2.28-0ubuntu1"
1650 },
1651 "393219": {
1652 "id": 393219,
1653 "updater": "",
1654 "name": "CVE-2018-10754",
1655 "description": "In ncurses before 6.1.20180414, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service if the terminfo library code is used to process untrusted terminfo data in which a use-name is invalid syntax. The product proceeds to the dereference code path even after a \"dubious character `[' in name or alias field\" detection.",
1656 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10754 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10754.html https://bugzilla.redhat.com/show_bug.cgi?id=1566575 https://invisible-island.net/ncurses/NEWS.html#t20180414 https://drive.google.com/drive/u/2/folders/1klyBjovfKXhLqBhbWX1n9dwqD-qne5f2",
1657 "severity": "Low",
1658 "fixed_in_version": "6.1+20180210-4ubuntu1"
1659 },
1660 "393226": {
1661 "id": 393226,
1662 "updater": "",
1663 "name": "CVE-2018-10844",
1664 "description": "It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.",
1665 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10844.html https://eprint.iacr.org/2018/747 https://usn.ubuntu.com/usn/usn-3999-1 https://gitlab.com/gnutls/gnutls/issues/456",
1666 "severity": "Medium",
1667 "fixed_in_version": "3.6.4-2ubuntu1"
1668 },
1669 "393228": {
1670 "id": 393228,
1671 "updater": "",
1672 "name": "CVE-2018-10845",
1673 "description": "It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.",
1674 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10845.html https://eprint.iacr.org/2018/747 https://usn.ubuntu.com/usn/usn-3999-1 https://gitlab.com/gnutls/gnutls/issues/456",
1675 "severity": "Medium",
1676 "fixed_in_version": "3.6.4-2ubuntu1"
1677 },
1678 "393230": {
1679 "id": 393230,
1680 "updater": "",
1681 "name": "CVE-2018-10846",
1682 "description": "A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of \"Just in Time\" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.",
1683 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10846.html https://eprint.iacr.org/2018/747 https://usn.ubuntu.com/usn/usn-3999-1 https://gitlab.com/gnutls/gnutls/issues/456",
1684 "severity": "Medium",
1685 "fixed_in_version": "3.6.4-2ubuntu1"
1686 },
1687 "393269": {
1688 "id": 393269,
1689 "updater": "",
1690 "name": "CVE-2018-11236",
1691 "description": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.",
1692 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-11236.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071 https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
1693 "severity": "Medium",
1694 "fixed_in_version": "2.28-0ubuntu1"
1695 },
1696 "393271": {
1697 "id": 393271,
1698 "updater": "",
1699 "name": "CVE-2018-11237",
1700 "description": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.",
1701 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-11237.html https://sourceware.org/bugzilla/show_bug.cgi?id=23196 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070",
1702 "severity": "Medium",
1703 "fixed_in_version": "2.28-0ubuntu1"
1704 },
1705 "393324": {
1706 "id": 393324,
1707 "updater": "",
1708 "name": "CVE-2018-12020",
1709 "description": "mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the \"--status-fd 2\" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.",
1710 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12020.html https://dev.gnupg.org/T4012 https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2) https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4) https://usn.ubuntu.com/usn/usn-3675-1 https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/ https://neopg.io/blog/gpg-signature-spoof/ https://usn.ubuntu.com/usn/usn-3675-2 https://usn.ubuntu.com/usn/usn-3675-3 https://usn.ubuntu.com/usn/usn-3964-1 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901088",
1711 "severity": "Medium",
1712 "fixed_in_version": "2.2.8-1ubuntu1"
1713 },
1714 "394176": {
1715 "id": 394176,
1716 "updater": "",
1717 "name": "CVE-2018-19211",
1718 "description": "In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a \"dubious character `*' in name or alias field\" detection.",
1719 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19211.html https://bugzilla.redhat.com/show_bug.cgi?id=1643754",
1720 "severity": "Low",
1721 "fixed_in_version": "6.1+20180210-4ubuntu1"
1722 },
1723 "395186": {
1724 "id": 395186,
1725 "updater": "",
1726 "name": "CVE-2018-7738",
1727 "description": "In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.",
1728 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7738.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179 https://github.com/karelzak/util-linux/issues/539",
1729 "severity": "Negligible",
1730 "fixed_in_version": "2.32-0.1ubuntu2"
1731 },
1732 "395641": {
1733 "id": 395641,
1734 "updater": "",
1735 "name": "CVE-2019-12900",
1736 "description": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
1737 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12900.html https://usn.ubuntu.com/usn/usn-4038-1 https://usn.ubuntu.com/usn/usn-4038-2 https://usn.ubuntu.com/usn/usn-4038-3 https://usn.ubuntu.com/usn/usn-4038-4 https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494",
1738 "severity": "Medium",
1739 "fixed_in_version": "1.0.6-9ubuntu0.18.10.1"
1740 },
1741 "395974": {
1742 "id": 395974,
1743 "updater": "",
1744 "name": "CVE-2019-8457",
1745 "description": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.",
1746 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-8457.html https://www.sqlite.org/src/info/90acdbfce9c08858 https://usn.ubuntu.com/usn/usn-4004-1 https://usn.ubuntu.com/usn/usn-4004-2 https://usn.ubuntu.com/usn/usn-4019-1 https://usn.ubuntu.com/usn/usn-4019-2 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775",
1747 "severity": "Medium",
1748 "fixed_in_version": "5.3.28+dfsg1-0.1ubuntu0.1"
1749 },
1750 "402280": {
1751 "id": 402280,
1752 "updater": "",
1753 "name": "CVE-2018-0495",
1754 "description": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
1755 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-0495.html https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html https://usn.ubuntu.com/usn/usn-3689-1 https://usn.ubuntu.com/usn/usn-3689-2 https://usn.ubuntu.com/usn/usn-3692-1 https://usn.ubuntu.com/usn/usn-3692-2 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes https://usn.ubuntu.com/usn/usn-3850-1 https://usn.ubuntu.com/usn/usn-3850-2 https://dev.gnupg.org/T4011 https://bugzilla.mozilla.org/show_bug.cgi?id=1464971 (not public)",
1756 "severity": "Low",
1757 "fixed_in_version": "1.8.3-1ubuntu1"
1758 },
1759 "402434": {
1760 "id": 402434,
1761 "updater": "",
1762 "name": "CVE-2018-1000858",
1763 "description": "GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.",
1764 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000858.html https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html https://usn.ubuntu.com/usn/usn-3853-1",
1765 "severity": "Medium",
1766 "fixed_in_version": "2.2.8-3ubuntu1.1"
1767 },
1768 "404220": {
1769 "id": 404220,
1770 "updater": "",
1771 "name": "CVE-2018-15686",
1772 "description": "A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.",
1773 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-15686.html https://usn.ubuntu.com/usn/usn-3816-1 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796402 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912005",
1774 "severity": "Medium",
1775 "fixed_in_version": "239-7ubuntu10.3"
1776 },
1777 "404222": {
1778 "id": 404222,
1779 "updater": "",
1780 "name": "CVE-2018-15687",
1781 "description": "A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.",
1782 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-15687.html https://usn.ubuntu.com/usn/usn-3816-1 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796692 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912007",
1783 "severity": "Medium",
1784 "fixed_in_version": "239-7ubuntu10.3"
1785 },
1786 "404228": {
1787 "id": 404228,
1788 "updater": "",
1789 "name": "CVE-2018-15688",
1790 "description": "A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.",
1791 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-15688.html https://usn.ubuntu.com/usn/usn-3806-1 https://usn.ubuntu.com/usn/usn-3807-1 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912008",
1792 "severity": "Medium",
1793 "fixed_in_version": "239-7ubuntu10.1"
1794 },
1795 "404443": {
1796 "id": 404443,
1797 "updater": "",
1798 "name": "CVE-2018-16864",
1799 "description": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.",
1800 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16864.html https://usn.ubuntu.com/usn/usn-3855-1",
1801 "severity": "High",
1802 "fixed_in_version": "239-7ubuntu10.6"
1803 },
1804 "404445": {
1805 "id": 404445,
1806 "updater": "",
1807 "name": "CVE-2018-16865",
1808 "description": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.",
1809 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16865.html https://usn.ubuntu.com/usn/usn-3855-1",
1810 "severity": "High",
1811 "fixed_in_version": "239-7ubuntu10.6"
1812 },
1813 "404447": {
1814 "id": 404447,
1815 "updater": "",
1816 "name": "CVE-2018-16866",
1817 "description": "An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.",
1818 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16866.html https://usn.ubuntu.com/usn/usn-3855-1",
1819 "severity": "Medium",
1820 "fixed_in_version": "239-7ubuntu10.6"
1821 },
1822 "404747": {
1823 "id": 404747,
1824 "updater": "",
1825 "name": "CVE-2018-18311",
1826 "description": "Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.",
1827 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18311.html https://usn.ubuntu.com/usn/usn-3834-1 https://usn.ubuntu.com/usn/usn-3834-2 https://rt.perl.org/Public/Bug/Display.html?id=133204",
1828 "severity": "Medium",
1829 "fixed_in_version": "5.26.2-7ubuntu0.1"
1830 },
1831 "404749": {
1832 "id": 404749,
1833 "updater": "",
1834 "name": "CVE-2018-18312",
1835 "description": "Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.",
1836 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18312.html https://usn.ubuntu.com/usn/usn-3834-1 https://rt.perl.org/Public/Bug/Display.html?id=133423",
1837 "severity": "Medium",
1838 "fixed_in_version": "5.26.2-7ubuntu0.1"
1839 },
1840 "404751": {
1841 "id": 404751,
1842 "updater": "",
1843 "name": "CVE-2018-18313",
1844 "description": "Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.",
1845 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18313.html https://usn.ubuntu.com/usn/usn-3834-1 https://usn.ubuntu.com/usn/usn-3834-2 https://rt.perl.org/Public/Bug/Display.html?id=133192",
1846 "severity": "Medium",
1847 "fixed_in_version": "5.26.2-7ubuntu0.1"
1848 },
1849 "404753": {
1850 "id": 404753,
1851 "updater": "",
1852 "name": "CVE-2018-18314",
1853 "description": "Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.",
1854 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18314.html https://usn.ubuntu.com/usn/usn-3834-1 https://rt.perl.org/Public/Bug/Display.html?id=131649",
1855 "severity": "Medium",
1856 "fixed_in_version": "5.26.2-7ubuntu0.1"
1857 },
1858 "406216": {
1859 "id": 406216,
1860 "updater": "",
1861 "name": "CVE-2018-6954",
1862 "description": "systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.",
1863 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6954.html https://usn.ubuntu.com/usn/usn-3816-1 https://usn.ubuntu.com/usn/usn-3816-2 https://github.com/systemd/systemd/issues/7986 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890779",
1864 "severity": "Medium",
1865 "fixed_in_version": "239-7ubuntu10.4"
1866 },
1867 "407083": {
1868 "id": 407083,
1869 "updater": "",
1870 "name": "CVE-2019-3462",
1871 "description": "Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.",
1872 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html https://usn.ubuntu.com/usn/usn-3863-1 https://usn.ubuntu.com/usn/usn-3863-2 https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1812353",
1873 "severity": "High",
1874 "fixed_in_version": "1.7.0ubuntu0.1"
1875 },
1876 "407102": {
1877 "id": 407102,
1878 "updater": "",
1879 "name": "CVE-2019-3829",
1880 "description": "A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.",
1881 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3829.html https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html https://usn.ubuntu.com/usn/usn-3999-1 https://gitlab.com/gnutls/gnutls/issues/694",
1882 "severity": "Medium",
1883 "fixed_in_version": "3.6.4-2ubuntu1.2"
1884 },
1885 "407106": {
1886 "id": 407106,
1887 "updater": "",
1888 "name": "CVE-2019-3836",
1889 "description": "It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.",
1890 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3836.html https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html https://usn.ubuntu.com/usn/usn-3999-1 https://gitlab.com/gnutls/gnutls/issues/704",
1891 "severity": "Medium",
1892 "fixed_in_version": "3.6.4-2ubuntu1.2"
1893 },
1894 "407149": {
1895 "id": 407149,
1896 "updater": "",
1897 "name": "CVE-2019-3842",
1898 "description": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
1899 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3842.html https://usn.ubuntu.com/usn/usn-3938-1 https://bugs.launchpad.net/bugs/1812316",
1900 "severity": "Medium",
1901 "fixed_in_version": "239-7ubuntu10.12"
1902 },
1903 "407416": {
1904 "id": 407416,
1905 "updater": "",
1906 "name": "CVE-2019-6454",
1907 "description": "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).",
1908 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-6454.html https://usn.ubuntu.com/usn/usn-3891-1",
1909 "severity": "Medium",
1910 "fixed_in_version": "239-7ubuntu10.8"
1911 },
1912 "407765": {
1913 "id": 407765,
1914 "updater": "",
1915 "name": "CVE-2019-9893",
1916 "description": "libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.",
1917 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9893.html https://www.openwall.com/lists/oss-security/2019/03/15/1 http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html https://usn.ubuntu.com/usn/usn-4001-1 https://usn.ubuntu.com/usn/usn-4001-2",
1918 "severity": "Medium",
1919 "fixed_in_version": "2.4.1-0ubuntu0.18.10.3"
1920 },
1921 "748564": {
1922 "id": 748564,
1923 "updater": "",
1924 "name": "CVE-2009-5155",
1925 "description": "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.",
1926 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 http://people.canonical.com/~ubuntu-security/cve/2009/CVE-2009-5155.html https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://sourceware.org/bugzilla/show_bug.cgi?id=18986",
1927 "severity": "Low",
1928 "fixed_in_version": ""
1929 },
1930 "748975": {
1931 "id": 748975,
1932 "updater": "",
1933 "name": "CVE-2013-4235",
1934 "description": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
1935 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-4235.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778950 https://bugzilla.redhat.com/show_bug.cgi?id=884658",
1936 "severity": "Low",
1937 "fixed_in_version": ""
1938 },
1939 "750221": {
1940 "id": 750221,
1941 "updater": "",
1942 "name": "CVE-2015-8985",
1943 "description": "The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.",
1944 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8985.html https://sourceware.org/bugzilla/show_bug.cgi?id=21163 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392",
1945 "severity": "Low",
1946 "fixed_in_version": ""
1947 },
1948 "750473": {
1949 "id": 750473,
1950 "updater": "",
1951 "name": "CVE-2016-10228",
1952 "description": "The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
1953 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10228.html https://sourceware.org/bugzilla/show_bug.cgi?id=19519 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503",
1954 "severity": "Negligible",
1955 "fixed_in_version": ""
1956 },
1957 "750655": {
1958 "id": 750655,
1959 "updater": "",
1960 "name": "CVE-2016-10739",
1961 "description": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
1962 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10739.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047 https://bugzilla.redhat.com/show_bug.cgi?id=1347549 https://sourceware.org/bugzilla/show_bug.cgi?id=20018",
1963 "severity": "Low",
1964 "fixed_in_version": ""
1965 },
1966 "750784": {
1967 "id": 750784,
1968 "updater": "",
1969 "name": "CVE-2016-2781",
1970 "description": "chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
1971 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2781.html http://seclists.org/oss-sec/2016/q1/452 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816320 https://bugzilla.redhat.com/show_bug.cgi?id=1312863",
1972 "severity": "Low",
1973 "fixed_in_version": ""
1974 },
1975 "752825": {
1976 "id": 752825,
1977 "updater": "",
1978 "name": "CVE-2017-11164",
1979 "description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
1980 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-11164.html http://openwall.com/lists/oss-security/2017/07/11/3",
1981 "severity": "Low",
1982 "fixed_in_version": ""
1983 },
1984 "756621": {
1985 "id": 756621,
1986 "updater": "",
1987 "name": "CVE-2017-7245",
1988 "description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
1989 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7245 http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7245.html https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://bugs.exim.org/show_bug.cgi?id=2055 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858678",
1990 "severity": "Negligible",
1991 "fixed_in_version": ""
1992 },
1993 "756626": {
1994 "id": 756626,
1995 "updater": "",
1996 "name": "CVE-2017-7246",
1997 "description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
1998 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7246 http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7246.html https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://bugs.exim.org/show_bug.cgi?id=2057 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858679",
1999 "severity": "Negligible",
2000 "fixed_in_version": ""
2001 },
2002 "757001": {
2003 "id": 757001,
2004 "updater": "",
2005 "name": "CVE-2017-8283",
2006 "description": "dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.",
2007 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8283 http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8283.html http://www.openwall.com/lists/oss-security/2017/04/20/2",
2008 "severity": "Negligible",
2009 "fixed_in_version": ""
2010 },
2011 "757791": {
2012 "id": 757791,
2013 "updater": "",
2014 "name": "CVE-2018-1000654",
2015 "description": "GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.",
2016 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000654.html https://gitlab.com/gnutls/libtasn1/issues/4 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906768",
2017 "severity": "Negligible",
2018 "fixed_in_version": ""
2019 },
2020 "758456": {
2021 "id": 758456,
2022 "updater": "",
2023 "name": "CVE-2018-11236",
2024 "description": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.",
2025 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-11236.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071 https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
2026 "severity": "Medium",
2027 "fixed_in_version": ""
2028 },
2029 "758457": {
2030 "id": 758457,
2031 "updater": "",
2032 "name": "CVE-2018-11237",
2033 "description": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.",
2034 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-11237.html https://sourceware.org/bugzilla/show_bug.cgi?id=23196 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070",
2035 "severity": "Medium",
2036 "fixed_in_version": ""
2037 },
2038 "761791": {
2039 "id": 761791,
2040 "updater": "",
2041 "name": "CVE-2018-16868",
2042 "description": "A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.",
2043 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16868.html http://cat.eyalro.net/ https://gitlab.com/gnutls/gnutls/issues/630",
2044 "severity": "Low",
2045 "fixed_in_version": ""
2046 },
2047 "761794": {
2048 "id": 761794,
2049 "updater": "",
2050 "name": "CVE-2018-16869",
2051 "description": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.",
2052 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16869.html http://cat.eyalro.net/ https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html https://lists.debian.org/debian-lts/2019/03/msg00021.html",
2053 "severity": "Low",
2054 "fixed_in_version": ""
2055 },
2056 "762596": {
2057 "id": 762596,
2058 "updater": "",
2059 "name": "CVE-2018-19591",
2060 "description": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.",
2061 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19591.html https://sourceware.org/bugzilla/show_bug.cgi?id=23927 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837",
2062 "severity": "Medium",
2063 "fixed_in_version": ""
2064 },
2065 "762974": {
2066 "id": 762974,
2067 "updater": "",
2068 "name": "CVE-2018-20482",
2069 "description": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).",
2070 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20482.html https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug https://news.ycombinator.com/item?id=18745431 https://twitter.com/thatcks/status/1076166645708668928 http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917377 https://bugzilla.redhat.com/show_bug.cgi?id=1662346",
2071 "severity": "Low",
2072 "fixed_in_version": ""
2073 },
2074 "763355": {
2075 "id": 763355,
2076 "updater": "",
2077 "name": "CVE-2018-20796",
2078 "description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
2079 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20796 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20796.html https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
2080 "severity": "Negligible",
2081 "fixed_in_version": ""
2082 },
2083 "763361": {
2084 "id": 763361,
2085 "updater": "",
2086 "name": "CVE-2018-20839",
2087 "description": "systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.",
2088 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20839 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20839.html https://github.com/systemd/systemd/pull/12378 https://github.com/systemd/systemd/pull/13109 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929116 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929229 https://gitlab.freedesktop.org/xorg/xserver/issues/857",
2089 "severity": "Medium",
2090 "fixed_in_version": ""
2091 },
2092 "765386": {
2093 "id": 765386,
2094 "updater": "",
2095 "name": "CVE-2018-7169",
2096 "description": "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.",
2097 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7169.html https://github.com/shadow-maint/shadow/pull/97 https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890557",
2098 "severity": "Low",
2099 "fixed_in_version": ""
2100 },
2101 "765686": {
2102 "id": 765686,
2103 "updater": "",
2104 "name": "CVE-2018-7738",
2105 "description": "In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.",
2106 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7738.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179 https://github.com/karelzak/util-linux/issues/539",
2107 "severity": "Negligible",
2108 "fixed_in_version": ""
2109 },
2110 "769004": {
2111 "id": 769004,
2112 "updater": "",
2113 "name": "CVE-2019-11922",
2114 "description": "A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.",
2115 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11922 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11922.html https://github.com/facebook/zstd/commit/3e5cdf1b6a85843e991d7d10f6a2567c15580da0 https://github.com/facebook/zstd/pull/1404/commits/3e5cdf1b6a85843e991d7d10f6a2567c15580da0 https://www.facebook.com/security/advisories/cve-2019-11922 https://usn.ubuntu.com/usn/usn-4108-1",
2116 "severity": "Medium",
2117 "fixed_in_version": "1.3.3+dfsg-2ubuntu1.1"
2118 },
2119 "769147": {
2120 "id": 769147,
2121 "updater": "",
2122 "name": "CVE-2019-12290",
2123 "description": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.",
2124 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12290.html https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5 https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de https://gitlab.com/libidn/libidn2/merge_requests/71 https://usn.ubuntu.com/usn/usn-4168-1",
2125 "severity": "Medium",
2126 "fixed_in_version": "2.0.4-1.1ubuntu0.2"
2127 },
2128 "769584": {
2129 "id": 769584,
2130 "updater": "",
2131 "name": "CVE-2019-12904",
2132 "description": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.)",
2133 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12904 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html https://dev.gnupg.org/T4541",
2134 "severity": "Low",
2135 "fixed_in_version": ""
2136 },
2137 "769727": {
2138 "id": 769727,
2139 "updater": "",
2140 "name": "CVE-2019-13050",
2141 "description": "Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.",
2142 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13050.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://bugs.launchpad.net/bugs/1844059 https://dev.gnupg.org/T4591 https://dev.gnupg.org/T4607 https://dev.gnupg.org/T4628 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-13050",
2143 "severity": "Medium",
2144 "fixed_in_version": ""
2145 },
2146 "770260": {
2147 "id": 770260,
2148 "updater": "",
2149 "name": "CVE-2019-13627",
2150 "description": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.",
2151 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13627.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=938938",
2152 "severity": "Medium",
2153 "fixed_in_version": ""
2154 },
2155 "780481": {
2156 "id": 780481,
2157 "updater": "",
2158 "name": "CVE-2019-17543",
2159 "description": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"",
2160 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17543.html https://github.com/lz4/lz4/pull/756 https://github.com/lz4/lz4/pull/760 https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680",
2161 "severity": "Low",
2162 "fixed_in_version": ""
2163 },
2164 "780489": {
2165 "id": 780489,
2166 "updater": "",
2167 "name": "CVE-2019-17594",
2168 "description": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.",
2169 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17594.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942401",
2170 "severity": "Negligible",
2171 "fixed_in_version": ""
2172 },
2173 "780491": {
2174 "id": 780491,
2175 "updater": "",
2176 "name": "CVE-2019-17595",
2177 "description": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.",
2178 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17595.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942401",
2179 "severity": "Negligible",
2180 "fixed_in_version": ""
2181 },
2182 "780763": {
2183 "id": 780763,
2184 "updater": "",
2185 "name": "CVE-2019-18224",
2186 "description": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.",
2187 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18224 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18224.html https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12420 https://github.com/libidn/libidn2/commit/e4d1558aa2c1c04a05066ee8600f37603890ba8c https://github.com/libidn/libidn2/compare/libidn2-2.1.0...libidn2-2.1.1 https://usn.ubuntu.com/usn/usn-4168-1",
2188 "severity": "Medium",
2189 "fixed_in_version": "2.0.4-1.1ubuntu0.2"
2190 },
2191 "789522": {
2192 "id": 789522,
2193 "updater": "",
2194 "name": "CVE-2019-3843",
2195 "description": "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.",
2196 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3843.html https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928102 https://bugs.chromium.org/p/project-zero/issues/detail?id=1771 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1814596 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843",
2197 "severity": "Low",
2198 "fixed_in_version": ""
2199 },
2200 "789524": {
2201 "id": 789524,
2202 "updater": "",
2203 "name": "CVE-2019-3844",
2204 "description": "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.",
2205 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3844.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928102 https://bugzilla.redhat.com/show_bug.cgi?id=1684610 https://bugs.chromium.org/p/project-zero/issues/detail?id=1771 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1814596",
2206 "severity": "Low",
2207 "fixed_in_version": ""
2208 },
2209 "790264": {
2210 "id": 790264,
2211 "updater": "",
2212 "name": "CVE-2019-7309",
2213 "description": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
2214 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7309.html https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html https://sourceware.org/ml/libc-alpha/2019-02/msg00063.html https://sourceware.org/bugzilla/show_bug.cgi?id=24155",
2215 "severity": "Negligible",
2216 "fixed_in_version": ""
2217 },
2218 "790675": {
2219 "id": 790675,
2220 "updater": "",
2221 "name": "CVE-2019-9169",
2222 "description": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
2223 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9169.html https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
2224 "severity": "Low",
2225 "fixed_in_version": ""
2226 },
2227 "790678": {
2228 "id": 790678,
2229 "updater": "",
2230 "name": "CVE-2019-9192",
2231 "description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
2232 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9192 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9192.html https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
2233 "severity": "Negligible",
2234 "fixed_in_version": ""
2235 },
2236 "839718": {
2237 "id": 839718,
2238 "updater": "",
2239 "name": "CVE-2019-15718",
2240 "description": "In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.",
2241 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15718.html https://usn.ubuntu.com/usn/usn-4120-1 https://bugzilla.redhat.com/show_bug.cgi?id=1746057",
2242 "severity": "Medium",
2243 "fixed_in_version": "237-3ubuntu10.28"
2244 },
2245 "842718": {
2246 "id": 842718,
2247 "updater": "",
2248 "name": "CVE-2019-5094",
2249 "description": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
2250 "links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5094.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887 https://usn.ubuntu.com/usn/usn-4142-1 https://usn.ubuntu.com/usn/usn-4142-2",
2251 "severity": "Medium",
2252 "fixed_in_version": "1.44.1-1ubuntu1.2"
2253 }
2254 },
2255 "package_vulnerabilities": {
2256 "102": [
2257 761794
2258 ],
2259 "106": [
2260 842718
2261 ],
2262 "110": [
2263 769147,
2264 780763
2265 ],
2266 "118": [
2267 780481
2268 ],
2269 "122": [
2270 770260,
2271 769584,
2272 402280
2273 ],
2274 "124": [
2275 393219,
2276 394176,
2277 780489,
2278 780491
2279 ],
2280 "128": [
2281 389741,
2282 389970,
2283 395186,
2284 765686
2285 ],
2286 "130": [
2287 395974
2288 ],
2289 "142": [
2290 393324,
2291 402434,
2292 769727
2293 ],
2294 "148": [
2295 389741,
2296 389970,
2297 395186,
2298 765686
2299 ],
2300 "150": [
2301 393226,
2302 393228,
2303 393230,
2304 407102,
2305 407106,
2306 761791
2307 ],
2308 "152": [
2309 404220,
2310 404222,
2311 404228,
2312 404443,
2313 404445,
2314 404447,
2315 406216,
2316 407149,
2317 407416,
2318 763361,
2319 789522,
2320 789524,
2321 839718
2322 ],
2323 "154": [
2324 769004
2325 ],
2326 "156": [
2327 388754,
2328 388757,
2329 389424,
2330 391657,
2331 393269,
2332 393271,
2333 748564,
2334 750221,
2335 750473,
2336 750655,
2337 758456,
2338 758457,
2339 762596,
2340 763355,
2341 790264,
2342 790675,
2343 790678
2344 ],
2345 "158": [
2346 389741,
2347 389970,
2348 395186,
2349 765686
2350 ],
2351 "160": [
2352 752825,
2353 756621,
2354 756626
2355 ],
2356 "162": [
2357 750784
2358 ],
2359 "164": [
2360 842718
2361 ],
2362 "166": [
2363 762974
2364 ],
2365 "170": [
2366 395641
2367 ],
2368 "172": [
2369 389741,
2370 389970,
2371 395186,
2372 765686
2373 ],
2374 "174": [
2375 757791
2376 ],
2377 "176": [
2378 395641
2379 ],
2380 "178": [
2381 761794
2382 ],
2383 "192": [
2384 748975,
2385 765386
2386 ],
2387 "196": [
2388 393219,
2389 394176,
2390 780489,
2391 780491
2392 ],
2393 "198": [
2394 388754,
2395 388757,
2396 389424,
2397 391657,
2398 393269,
2399 393271,
2400 748564,
2401 750221,
2402 750473,
2403 750655,
2404 758456,
2405 758457,
2406 762596,
2407 763355,
2408 790264,
2409 790675,
2410 790678
2411 ],
2412 "202": [
2413 407765
2414 ],
2415 "214": [
2416 757001
2417 ],
2418 "218": [
2419 407083
2420 ],
2421 "236": [
2422 389741,
2423 389970,
2424 395186,
2425 765686
2426 ],
2427 "238": [
2428 748975,
2429 765386
2430 ],
2431 "242": [
2432 842718
2433 ],
2434 "246": [
2435 393219,
2436 394176,
2437 780489,
2438 780491
2439 ],
2440 "254": [
2441 765686,
2442 395186,
2443 389970,
2444 389741
2445 ],
2446 "258": [
2447 389741,
2448 389970,
2449 395186,
2450 765686
2451 ],
2452 "82": [
2453 389741,
2454 389970,
2455 395186,
2456 765686
2457 ],
2458 "86": [
2459 393219,
2460 394176,
2461 780489,
2462 780491
2463 ],
2464 "88": [
2465 842718
2466 ],
2467 "90": [
2468 407083
2469 ],
2470 "94": [
2471 393219,
2472 394176,
2473 780489,
2474 780491
2475 ],
2476 "96": [
2477 404747,
2478 404749,
2479 404751,
2480 404753
2481 ],
2482 "98": [
2483 404220,
2484 404222,
2485 404228,
2486 404443,
2487 404445,
2488 404447,
2489 406216,
2490 407149,
2491 407416,
2492 763361,
2493 789522,
2494 789524,
2495 839718
2496 ]
2497 }
2498}