diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/002eab5e-d497-4f55-a370-e42530624705.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/002eab5e-d497-4f55-a370-e42530624705.json new file mode 100644 index 00000000..84b51bd8 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/002eab5e-d497-4f55-a370-e42530624705.json @@ -0,0 +1 @@ +{"ID": "002eab5e-d497-4f55-a370-e42530624705", "effective_cve": "CVE-2015-5741", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "libgcc1", "version": "1:5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:04:47.823732+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5741"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/18650828-b5a5-465b-b1ff-35717092fc3b.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/18650828-b5a5-465b-b1ff-35717092fc3b.json new file mode 100644 index 00000000..6b8dd70d --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/18650828-b5a5-465b-b1ff-35717092fc3b.json @@ -0,0 +1 @@ +{"ID": "18650828-b5a5-465b-b1ff-35717092fc3b", "effective_cve": "CVE-2015-5739", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "libgcc1", "version": "1:5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:04:47.070813+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5739"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/24e73d03-0315-469f-8b3f-0bcdc82f43ac.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/24e73d03-0315-469f-8b3f-0bcdc82f43ac.json new file mode 100644 index 00000000..782b2fad --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/24e73d03-0315-469f-8b3f-0bcdc82f43ac.json @@ -0,0 +1 @@ +{"ID": "24e73d03-0315-469f-8b3f-0bcdc82f43ac", "effective_cve": "CVE-2016-6252", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "passwd", "version": "1:4.1.5.1-1.1ubuntu7"}, "timestamp": "2024-06-10T15:05:24.234678+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-6252"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/29e06ac6-e04b-4d4b-9f49-3379b61aa7bd.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/29e06ac6-e04b-4d4b-9f49-3379b61aa7bd.json new file mode 100644 index 00000000..db9a0ba7 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/29e06ac6-e04b-4d4b-9f49-3379b61aa7bd.json @@ -0,0 +1 @@ +{"ID": "29e06ac6-e04b-4d4b-9f49-3379b61aa7bd", "effective_cve": "CVE-2015-5739", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "libstdc++6", "version": "5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:04:50.892488+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5739"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/2d089a98-499d-4539-b484-417ab41232aa.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/2d089a98-499d-4539-b484-417ab41232aa.json new file mode 100644 index 00000000..4ea462af --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/2d089a98-499d-4539-b484-417ab41232aa.json @@ -0,0 +1 @@ +{"ID": "2d089a98-499d-4539-b484-417ab41232aa", "effective_cve": "CVE-2016-6251", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "??", "package": {"name": "passwd", "version": "1:4.1.5.1-1.1ubuntu7"}, "timestamp": "2024-06-10T15:05:18.188480+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-6251"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/4003d7db-647c-4384-bb4f-16f8ef4a2769.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/4003d7db-647c-4384-bb4f-16f8ef4a2769.json new file mode 100644 index 00000000..4170672e --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/4003d7db-647c-4384-bb4f-16f8ef4a2769.json @@ -0,0 +1 @@ +{"ID": "4003d7db-647c-4384-bb4f-16f8ef4a2769", "effective_cve": "CVE-2016-6251", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "??", "package": {"name": "login", "version": "1:4.1.5.1-1.1ubuntu7"}, "timestamp": "2024-06-10T15:05:01.512004+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-6251"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/685d7750-6f6b-4a06-a0ff-b4fa1f8aeb5f.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/685d7750-6f6b-4a06-a0ff-b4fa1f8aeb5f.json new file mode 100644 index 00000000..5c6577da --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/685d7750-6f6b-4a06-a0ff-b4fa1f8aeb5f.json @@ -0,0 +1 @@ +{"ID": "685d7750-6f6b-4a06-a0ff-b4fa1f8aeb5f", "effective_cve": "CVE-2015-8853", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "perl-base", "version": "5.20.2-6ubuntu0.2"}, "timestamp": "2024-06-10T15:05:28.904032+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-8853"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/7321a758-7edb-49a5-95ea-8312b88e28bd.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/7321a758-7edb-49a5-95ea-8312b88e28bd.json new file mode 100644 index 00000000..d21b7166 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/7321a758-7edb-49a5-95ea-8312b88e28bd.json @@ -0,0 +1 @@ +{"ID": "7321a758-7edb-49a5-95ea-8312b88e28bd", "effective_cve": "CVE-2016-6252", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "login", "version": "1:4.1.5.1-1.1ubuntu7"}, "timestamp": "2024-06-10T15:05:10.457502+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-6252"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/7e204530-972b-41ac-9fe8-551e4662c5da.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/7e204530-972b-41ac-9fe8-551e4662c5da.json new file mode 100644 index 00000000..671f6813 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/7e204530-972b-41ac-9fe8-551e4662c5da.json @@ -0,0 +1 @@ +{"ID": "7e204530-972b-41ac-9fe8-551e4662c5da", "effective_cve": "CVE-2015-5739", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "gcc-5-base", "version": "5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:02:34.937903+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5739"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/98a8e87e-ce40-402f-b47e-0753ced90b81.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/98a8e87e-ce40-402f-b47e-0753ced90b81.json new file mode 100644 index 00000000..60d52c8c --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/98a8e87e-ce40-402f-b47e-0753ced90b81.json @@ -0,0 +1 @@ +{"ID": "98a8e87e-ce40-402f-b47e-0753ced90b81", "effective_cve": "CVE-2016-4429", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "libc-bin", "version": "2.21-0ubuntu4.3"}, "timestamp": "2024-06-10T15:04:16.483178+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-4429"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/9eabf9aa-4c39-4d1e-b077-70979957132a.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/9eabf9aa-4c39-4d1e-b077-70979957132a.json new file mode 100644 index 00000000..5ca6b0b0 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/9eabf9aa-4c39-4d1e-b077-70979957132a.json @@ -0,0 +1 @@ +{"ID": "9eabf9aa-4c39-4d1e-b077-70979957132a", "effective_cve": "CVE-2015-5741", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "gcc-5-base", "version": "5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:02:37.122006+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5741"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/a352193b-1af7-4e40-ac25-30513a98f628.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/a352193b-1af7-4e40-ac25-30513a98f628.json new file mode 100644 index 00000000..0694ea2a --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/a352193b-1af7-4e40-ac25-30513a98f628.json @@ -0,0 +1 @@ +{"ID": "a352193b-1af7-4e40-ac25-30513a98f628", "effective_cve": "CVE-2015-5740", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "libgcc1", "version": "1:5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:04:47.441997+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5740"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/ab732f01-0d71-468b-9686-827b071c95f8.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/ab732f01-0d71-468b-9686-827b071c95f8.json new file mode 100644 index 00000000..cd29d8c4 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/ab732f01-0d71-468b-9686-827b071c95f8.json @@ -0,0 +1 @@ +{"ID": "ab732f01-0d71-468b-9686-827b071c95f8", "effective_cve": "CVE-2015-5740", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "gcc-5-base", "version": "5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:02:36.116707+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5740"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/b8f85203-d668-4ceb-94a8-2f4b5b2836f8.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/b8f85203-d668-4ceb-94a8-2f4b5b2836f8.json new file mode 100644 index 00000000..cdbe2e54 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/b8f85203-d668-4ceb-94a8-2f4b5b2836f8.json @@ -0,0 +1 @@ +{"ID": "b8f85203-d668-4ceb-94a8-2f4b5b2836f8", "effective_cve": "CVE-2016-4429", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "multiarch-support", "version": "2.21-0ubuntu4.3"}, "timestamp": "2024-06-10T15:04:27.453903+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-4429"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/db92cad5-5179-4334-bef4-70d3bf12c618.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/db92cad5-5179-4334-bef4-70d3bf12c618.json new file mode 100644 index 00000000..75cde800 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/db92cad5-5179-4334-bef4-70d3bf12c618.json @@ -0,0 +1 @@ +{"ID": "db92cad5-5179-4334-bef4-70d3bf12c618", "effective_cve": "CVE-2015-5741", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "libstdc++6", "version": "5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:04:51.518740+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5741"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/de0002bf-4bcf-49e8-aa54-c1948b0ba958.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/de0002bf-4bcf-49e8-aa54-c1948b0ba958.json new file mode 100644 index 00000000..3758e516 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/de0002bf-4bcf-49e8-aa54-c1948b0ba958.json @@ -0,0 +1 @@ +{"ID": "de0002bf-4bcf-49e8-aa54-c1948b0ba958", "effective_cve": "CVE-2016-6185", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "perl-base", "version": "5.20.2-6ubuntu0.2"}, "timestamp": "2024-06-10T15:05:29.709345+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-6185"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/e1467a77-0016-4001-9da6-f1692dccd2d2.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/e1467a77-0016-4001-9da6-f1692dccd2d2.json new file mode 100644 index 00000000..4fd47121 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/e1467a77-0016-4001-9da6-f1692dccd2d2.json @@ -0,0 +1 @@ +{"ID": "e1467a77-0016-4001-9da6-f1692dccd2d2", "effective_cve": "CVE-2016-4429", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "TP", "package": {"name": "libc6", "version": "2.21-0ubuntu4.3"}, "timestamp": "2024-06-10T15:04:27.075154+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-4429"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/f7451faf-463f-4750-bf1e-57e34232b67b.json b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/f7451faf-463f-4750-bf1e-57e34232b67b.json new file mode 100644 index 00000000..ee3397e3 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3/f7451faf-463f-4750-bf1e-57e34232b67b.json @@ -0,0 +1 @@ +{"ID": "f7451faf-463f-4750-bf1e-57e34232b67b", "effective_cve": "CVE-2015-5740", "image": {"exact": "docker.io/ubuntu@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3"}, "label": "FP", "package": {"name": "libstdc++6", "version": "5.2.1-22ubuntu2"}, "timestamp": "2024-06-10T15:04:51.246779+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-5740"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5/37ae4ae9-e3ae-4ba7-aea4-23c515190732.json b/labels/docker.io+ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5/37ae4ae9-e3ae-4ba7-aea4-23c515190732.json new file mode 100644 index 00000000..fcf8af3f --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5/37ae4ae9-e3ae-4ba7-aea4-23c515190732.json @@ -0,0 +1 @@ +{"ID": "37ae4ae9-e3ae-4ba7-aea4-23c515190732", "effective_cve": "CVE-2020-22916", "image": {"exact": "docker.io/ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5"}, "label": "??", "package": {"name": "liblzma5", "version": "5.4.1-0.2"}, "timestamp": "2024-06-10T15:19:16.738838+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2020-22916"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5/ca2e2b3c-408a-4790-aed1-6d5af7065130.json b/labels/docker.io+ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5/ca2e2b3c-408a-4790-aed1-6d5af7065130.json new file mode 100644 index 00000000..0dbb84a5 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5/ca2e2b3c-408a-4790-aed1-6d5af7065130.json @@ -0,0 +1 @@ +{"ID": "ca2e2b3c-408a-4790-aed1-6d5af7065130", "effective_cve": "CVE-2021-46848", "image": {"exact": "docker.io/ubuntu@sha256:09f035f46361d193ded647342903b413d57d05cc06acff8285f9dda9f2d269d5"}, "label": "??", "package": {"name": "libtasn1-6", "version": "4.19.0-2"}, "timestamp": "2024-06-10T15:19:19.217677+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2021-46848"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/0a0b0254-701c-4c01-abd3-d22840bfc4b4.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/0a0b0254-701c-4c01-abd3-d22840bfc4b4.json new file mode 100644 index 00000000..f56d29c4 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/0a0b0254-701c-4c01-abd3-d22840bfc4b4.json @@ -0,0 +1 @@ +{"ID": "0a0b0254-701c-4c01-abd3-d22840bfc4b4", "effective_cve": "CVE-2016-9843", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "zlib1g", "version": "1:1.2.3.4.dfsg-3ubuntu4"}, "timestamp": "2024-06-10T14:51:44.541233+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9843"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/3b001a8d-50ba-414e-9f13-083d5dd4c803.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/3b001a8d-50ba-414e-9f13-083d5dd4c803.json new file mode 100644 index 00000000..4cf12391 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/3b001a8d-50ba-414e-9f13-083d5dd4c803.json @@ -0,0 +1 @@ +{"ID": "3b001a8d-50ba-414e-9f13-083d5dd4c803", "effective_cve": "CVE-2011-0640", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "libudev0", "version": "175-0ubuntu9.10"}, "timestamp": "2024-06-10T14:50:53.001907+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2011-0640"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/438bf9a4-6e17-4795-b82d-45fb3e70fe20.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/438bf9a4-6e17-4795-b82d-45fb3e70fe20.json new file mode 100644 index 00000000..0a9f6c70 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/438bf9a4-6e17-4795-b82d-45fb3e70fe20.json @@ -0,0 +1 @@ +{"ID": "438bf9a4-6e17-4795-b82d-45fb3e70fe20", "effective_cve": "CVE-2016-5011", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-07T16:50:36.206283+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-5011"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/4a473cff-e399-4f47-bf8b-1b39027535c9.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/4a473cff-e399-4f47-bf8b-1b39027535c9.json new file mode 100644 index 00000000..0c8bbd15 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/4a473cff-e399-4f47-bf8b-1b39027535c9.json @@ -0,0 +1 @@ +{"ID": "4a473cff-e399-4f47-bf8b-1b39027535c9", "effective_cve": "CVE-2013-0157", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-07T16:49:52.300259+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2013-0157"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/4ddcb0ca-0330-414a-b2a4-7712ebbfe87b.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/4ddcb0ca-0330-414a-b2a4-7712ebbfe87b.json new file mode 100644 index 00000000..789646df --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/4ddcb0ca-0330-414a-b2a4-7712ebbfe87b.json @@ -0,0 +1 @@ +{"ID": "4ddcb0ca-0330-414a-b2a4-7712ebbfe87b", "effective_cve": "CVE-2016-6185", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "perl-base", "version": "5.14.2-6ubuntu2.5"}, "timestamp": "2024-06-10T14:51:33.240324+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-6185"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/63be6cc4-ebad-4efd-bd05-a7ffc3446953.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/63be6cc4-ebad-4efd-bd05-a7ffc3446953.json new file mode 100644 index 00000000..eff2f982 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/63be6cc4-ebad-4efd-bd05-a7ffc3446953.json @@ -0,0 +1 @@ +{"ID": "63be6cc4-ebad-4efd-bd05-a7ffc3446953", "effective_cve": "CVE-2017-8804", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "multiarch-support", "version": "2.15-0ubuntu10.18"}, "timestamp": "2024-06-10T14:51:02.010345+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-8804"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/654c9705-b0bc-4bb7-b305-ff75e54728ae.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/654c9705-b0bc-4bb7-b305-ff75e54728ae.json new file mode 100644 index 00000000..08ab95f7 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/654c9705-b0bc-4bb7-b305-ff75e54728ae.json @@ -0,0 +1 @@ +{"ID": "654c9705-b0bc-4bb7-b305-ff75e54728ae", "effective_cve": "CVE-2012-1088", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "Per https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2012-1088 the issue was in a script that the Ubuntu team believe was not in use", "package": {"name": "iproute", "version": "20111117-1ubuntu2.3"}, "timestamp": "2024-06-07T16:53:41.944788+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2012-1088"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/6c7c0b0a-78ae-427d-be64-bb0dfc270a17.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/6c7c0b0a-78ae-427d-be64-bb0dfc270a17.json new file mode 100644 index 00000000..4a76b464 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/6c7c0b0a-78ae-427d-be64-bb0dfc270a17.json @@ -0,0 +1 @@ +{"ID": "6c7c0b0a-78ae-427d-be64-bb0dfc270a17", "effective_cve": "CVE-2017-8804", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "libc-bin", "version": "2.15-0ubuntu10.18"}, "timestamp": "2024-06-10T14:45:09.817570+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-8804"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/6eead27e-f217-4d6f-89b2-0e095de17c63.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/6eead27e-f217-4d6f-89b2-0e095de17c63.json new file mode 100644 index 00000000..968c0dad --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/6eead27e-f217-4d6f-89b2-0e095de17c63.json @@ -0,0 +1 @@ +{"ID": "6eead27e-f217-4d6f-89b2-0e095de17c63", "effective_cve": "CVE-2014-9114", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-07T16:49:54.229948+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2014-9114"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/72a4275a-9d5f-4898-a4c5-5f6247d57640.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/72a4275a-9d5f-4898-a4c5-5f6247d57640.json new file mode 100644 index 00000000..2a30afa9 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/72a4275a-9d5f-4898-a4c5-5f6247d57640.json @@ -0,0 +1 @@ +{"ID": "72a4275a-9d5f-4898-a4c5-5f6247d57640", "effective_cve": "CVE-2002-2439", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "libstdc++6", "version": "4.6.3-1ubuntu5"}, "timestamp": "2024-06-10T14:49:57.457178+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2002-2439"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/73f3f859-11b5-479f-9351-c41ee804cfe5.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/73f3f859-11b5-479f-9351-c41ee804cfe5.json new file mode 100644 index 00000000..60805c46 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/73f3f859-11b5-479f-9351-c41ee804cfe5.json @@ -0,0 +1 @@ +{"ID": "73f3f859-11b5-479f-9351-c41ee804cfe5", "effective_cve": "CVE-2002-2439", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "note": "This one is super old, just going to mark as unknown", "package": {"name": "gcc-4.6-base", "version": "4.6.3-1ubuntu5"}, "timestamp": "2024-06-07T16:52:23.179924+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2002-2439"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/93d66375-9d8f-4650-b109-4c424b6db562.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/93d66375-9d8f-4650-b109-4c424b6db562.json new file mode 100644 index 00000000..9f5fdb3d --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/93d66375-9d8f-4650-b109-4c424b6db562.json @@ -0,0 +1 @@ +{"ID": "93d66375-9d8f-4650-b109-4c424b6db562", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "Per https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 su was from shadow rather than util-linux at this point", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-07T16:47:11.843201+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/943f4d05-0a33-4c0a-b726-9886da5b7bec.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/943f4d05-0a33-4c0a-b726-9886da5b7bec.json new file mode 100644 index 00000000..185304df --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/943f4d05-0a33-4c0a-b726-9886da5b7bec.json @@ -0,0 +1 @@ +{"ID": "943f4d05-0a33-4c0a-b726-9886da5b7bec", "effective_cve": "CVE-2016-9841", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "zlib1g", "version": "1:1.2.3.4.dfsg-3ubuntu4"}, "timestamp": "2024-06-10T14:51:43.295840+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9841"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/a7afcd7f-407d-4a1b-98a5-bb8d126090fa.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/a7afcd7f-407d-4a1b-98a5-bb8d126090fa.json new file mode 100644 index 00000000..3fd3621c --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/a7afcd7f-407d-4a1b-98a5-bb8d126090fa.json @@ -0,0 +1 @@ +{"ID": "a7afcd7f-407d-4a1b-98a5-bb8d126090fa", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "su from shadow not util-linux at this point", "package": {"name": "libblkid1", "version": "2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-07T16:55:16.496443+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c45f7e21-7838-4b3a-b53a-105d964b3d40.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c45f7e21-7838-4b3a-b53a-105d964b3d40.json new file mode 100644 index 00000000..a6c8585e --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c45f7e21-7838-4b3a-b53a-105d964b3d40.json @@ -0,0 +1 @@ +{"ID": "c45f7e21-7838-4b3a-b53a-105d964b3d40", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "ubuntu uses su from shadow package, not util-linux up until", "package": {"name": "mount", "version": "2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-10T14:48:31.560638+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c68390e4-f6bc-44b5-bb73-0c9fd186a2f9.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c68390e4-f6bc-44b5-bb73-0c9fd186a2f9.json deleted file mode 100644 index e75e9bc1..00000000 --- a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c68390e4-f6bc-44b5-bb73-0c9fd186a2f9.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "c68390e4-f6bc-44b5-bb73-0c9fd186a2f9", "effective_cve": "CVE-2016-5011", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2023-06-29T18:55:47.392997", "tool": "grype@v0.63.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-5011"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c8b2e5e9-650e-49e7-bd86-8ae855e8be83.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c8b2e5e9-650e-49e7-bd86-8ae855e8be83.json new file mode 100644 index 00000000..b76b0dd4 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/c8b2e5e9-650e-49e7-bd86-8ae855e8be83.json @@ -0,0 +1 @@ +{"ID": "c8b2e5e9-650e-49e7-bd86-8ae855e8be83", "effective_cve": "CVE-2016-9840", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "zlib1g", "version": "1:1.2.3.4.dfsg-3ubuntu4"}, "timestamp": "2024-06-10T14:51:42.797603+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9840"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/cd041b6d-a483-433a-993a-fb969bae5b68.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/cd041b6d-a483-433a-993a-fb969bae5b68.json new file mode 100644 index 00000000..cbb6538a --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/cd041b6d-a483-433a-993a-fb969bae5b68.json @@ -0,0 +1 @@ +{"ID": "cd041b6d-a483-433a-993a-fb969bae5b68", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "ubuntu uses su from shadow package, not util-linux up until", "package": {"name": "libuuid1", "version": "2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-10T14:47:59.604859+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/cfc17809-99b3-4009-affb-dfa175a31493.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/cfc17809-99b3-4009-affb-dfa175a31493.json new file mode 100644 index 00000000..795de987 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/cfc17809-99b3-4009-affb-dfa175a31493.json @@ -0,0 +1 @@ +{"ID": "cfc17809-99b3-4009-affb-dfa175a31493", "effective_cve": "CVE-2016-9842", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "zlib1g", "version": "1:1.2.3.4.dfsg-3ubuntu4"}, "timestamp": "2024-06-10T14:51:43.730050+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9842"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/dc0701c4-5749-43b3-b607-6b411377e875.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/dc0701c4-5749-43b3-b607-6b411377e875.json deleted file mode 100644 index e9063783..00000000 --- a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/dc0701c4-5749-43b3-b607-6b411377e875.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "dc0701c4-5749-43b3-b607-6b411377e875", "effective_cve": "CVE-2013-0157", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2023-06-29T18:55:45.804319", "tool": "grype@v0.63.0", "user": "westonsteimel", "vulnerability_id": "CVE-2013-0157"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/dc9a59be-cb10-4b96-bae1-18968f275831.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/dc9a59be-cb10-4b96-bae1-18968f275831.json new file mode 100644 index 00000000..8ad4406d --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/dc9a59be-cb10-4b96-bae1-18968f275831.json @@ -0,0 +1 @@ +{"ID": "dc9a59be-cb10-4b96-bae1-18968f275831", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "ubuntu uses su from shadow package, not util-linux up until", "package": {"name": "libmount1", "version": "2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-10T14:47:31.572685+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/e5b3d87e-3e45-4406-b55b-54925d181ac1.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/e5b3d87e-3e45-4406-b55b-54925d181ac1.json deleted file mode 100644 index 4eea4dad..00000000 --- a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/e5b3d87e-3e45-4406-b55b-54925d181ac1.json +++ /dev/null @@ -1 +0,0 @@ -{"ID": "e5b3d87e-3e45-4406-b55b-54925d181ac1", "effective_cve": "CVE-2014-9114", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "bsdutils", "version": "1:2.20.1-1ubuntu3.1"}, "timestamp": "2023-06-29T18:55:46.397841", "tool": "grype@v0.63.0", "user": "westonsteimel", "vulnerability_id": "CVE-2014-9114"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/ed036b33-a6dc-4cfc-82c1-f6ad5991042a.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/ed036b33-a6dc-4cfc-82c1-f6ad5991042a.json new file mode 100644 index 00000000..95dbfe8b --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/ed036b33-a6dc-4cfc-82c1-f6ad5991042a.json @@ -0,0 +1 @@ +{"ID": "ed036b33-a6dc-4cfc-82c1-f6ad5991042a", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "FP", "note": "ubuntu uses su from shadow package, not util-linux up until", "package": {"name": "util-linux", "version": "2.20.1-1ubuntu3.1"}, "timestamp": "2024-06-10T14:48:33.756442+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/ef5f78f6-84db-413b-8b6b-416e15ccd8f4.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/ef5f78f6-84db-413b-8b6b-416e15ccd8f4.json new file mode 100644 index 00000000..bc3c7f42 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/ef5f78f6-84db-413b-8b6b-416e15ccd8f4.json @@ -0,0 +1 @@ +{"ID": "ef5f78f6-84db-413b-8b6b-416e15ccd8f4", "effective_cve": "CVE-2015-8853", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "TP", "package": {"name": "perl-base", "version": "5.14.2-6ubuntu2.5"}, "timestamp": "2024-06-10T14:51:31.492144+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2015-8853"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/f655060c-9890-4562-823b-7eb2ca9ee415.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/f655060c-9890-4562-823b-7eb2ca9ee415.json new file mode 100644 index 00000000..3cdcdef1 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/f655060c-9890-4562-823b-7eb2ca9ee415.json @@ -0,0 +1 @@ +{"ID": "f655060c-9890-4562-823b-7eb2ca9ee415", "effective_cve": "CVE-2011-0640", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "udev", "version": "175-0ubuntu9.10"}, "timestamp": "2024-06-10T14:51:36.719609+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2011-0640"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/f8ae0aca-cab8-4131-a147-550a2918f626.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/f8ae0aca-cab8-4131-a147-550a2918f626.json new file mode 100644 index 00000000..855dcf2f --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/f8ae0aca-cab8-4131-a147-550a2918f626.json @@ -0,0 +1 @@ +{"ID": "f8ae0aca-cab8-4131-a147-550a2918f626", "effective_cve": "CVE-2017-8804", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "libc6", "version": "2.15-0ubuntu10.18"}, "timestamp": "2024-06-10T14:45:18.537475+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-8804"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/fcf54c2a-ceec-41dc-8f03-2854e0b237eb.json b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/fcf54c2a-ceec-41dc-8f03-2854e0b237eb.json new file mode 100644 index 00000000..4898e36c --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005/fcf54c2a-ceec-41dc-8f03-2854e0b237eb.json @@ -0,0 +1 @@ +{"ID": "fcf54c2a-ceec-41dc-8f03-2854e0b237eb", "effective_cve": "CVE-2002-2439", "image": {"exact": "docker.io/ubuntu@sha256:18305429afa14ea462f810146ba44d4363ae76e4c8dfc38288cf73aa07485005"}, "label": "??", "package": {"name": "libgcc1", "version": "1:4.6.3-1ubuntu5"}, "timestamp": "2024-06-10T14:46:31.747763+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2002-2439"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/09b812a2-847b-40b8-89f5-7907a79097a2.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/09b812a2-847b-40b8-89f5-7907a79097a2.json new file mode 100644 index 00000000..1cdb2178 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/09b812a2-847b-40b8-89f5-7907a79097a2.json @@ -0,0 +1 @@ +{"ID": "09b812a2-847b-40b8-89f5-7907a79097a2", "effective_cve": "CVE-2019-20386", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "TP", "package": {"name": "libsystemd0", "version": "240-6ubuntu5.8"}, "timestamp": "2024-06-10T15:13:58.877138+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-20386"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/2f3c4988-0188-4fd3-b5d6-ea292f21a908.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/2f3c4988-0188-4fd3-b5d6-ea292f21a908.json new file mode 100644 index 00000000..38caf922 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/2f3c4988-0188-4fd3-b5d6-ea292f21a908.json @@ -0,0 +1 @@ +{"ID": "2f3c4988-0188-4fd3-b5d6-ea292f21a908", "effective_cve": "CVE-2019-1010025", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc-bin", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:09.221942+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010025"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/64811597-434f-4d18-ac7c-f54493ab3817.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/64811597-434f-4d18-ac7c-f54493ab3817.json new file mode 100644 index 00000000..0a508e55 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/64811597-434f-4d18-ac7c-f54493ab3817.json @@ -0,0 +1 @@ +{"ID": "64811597-434f-4d18-ac7c-f54493ab3817", "effective_cve": "CVE-2019-19126", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc-bin", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:09.965860+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-19126"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/80419455-8322-4eba-9a07-fec752b5eba3.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/80419455-8322-4eba-9a07-fec752b5eba3.json new file mode 100644 index 00000000..6c0e0bf5 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/80419455-8322-4eba-9a07-fec752b5eba3.json @@ -0,0 +1 @@ +{"ID": "80419455-8322-4eba-9a07-fec752b5eba3", "effective_cve": "CVE-2019-1010022", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc6", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:12.772593+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010022"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/8ab64fb7-046d-44b8-b2d2-87a22c8e91b3.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/8ab64fb7-046d-44b8-b2d2-87a22c8e91b3.json new file mode 100644 index 00000000..f35afc13 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/8ab64fb7-046d-44b8-b2d2-87a22c8e91b3.json @@ -0,0 +1 @@ +{"ID": "8ab64fb7-046d-44b8-b2d2-87a22c8e91b3", "effective_cve": "CVE-2019-1010024", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc-bin", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:08.363523+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010024"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9035fe7e-f9e4-4fcb-88ac-fe2516a5023e.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9035fe7e-f9e4-4fcb-88ac-fe2516a5023e.json new file mode 100644 index 00000000..ae7d41d3 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9035fe7e-f9e4-4fcb-88ac-fe2516a5023e.json @@ -0,0 +1 @@ +{"ID": "9035fe7e-f9e4-4fcb-88ac-fe2516a5023e", "effective_cve": "CVE-2019-20386", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "TP", "package": {"name": "libudev1", "version": "240-6ubuntu5.8"}, "timestamp": "2024-06-10T15:14:11.406270+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-20386"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9357f982-3be9-470f-be65-c0899d20c28c.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9357f982-3be9-470f-be65-c0899d20c28c.json new file mode 100644 index 00000000..89921409 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9357f982-3be9-470f-be65-c0899d20c28c.json @@ -0,0 +1 @@ +{"ID": "9357f982-3be9-470f-be65-c0899d20c28c", "effective_cve": "CVE-2019-1010024", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc6", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:14.394756+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010024"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/94baa7cc-6127-463e-a604-617d06e307a2.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/94baa7cc-6127-463e-a604-617d06e307a2.json new file mode 100644 index 00000000..10a6a997 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/94baa7cc-6127-463e-a604-617d06e307a2.json @@ -0,0 +1 @@ +{"ID": "94baa7cc-6127-463e-a604-617d06e307a2", "effective_cve": "CVE-2019-15847", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "FP", "package": {"name": "gcc-9-base", "version": "9.1.0-2ubuntu2~19.04"}, "timestamp": "2024-06-10T15:10:56.527373+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-15847"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/977ec314-c915-428f-a2d7-e54cd4426198.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/977ec314-c915-428f-a2d7-e54cd4426198.json new file mode 100644 index 00000000..7a5603da --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/977ec314-c915-428f-a2d7-e54cd4426198.json @@ -0,0 +1 @@ +{"ID": "977ec314-c915-428f-a2d7-e54cd4426198", "effective_cve": "CVE-2019-1010023", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc-bin", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:07.095958+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010023"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9efe721d-bb9b-4449-8c6b-9f2fef31eb66.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9efe721d-bb9b-4449-8c6b-9f2fef31eb66.json new file mode 100644 index 00000000..9486219e --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9efe721d-bb9b-4449-8c6b-9f2fef31eb66.json @@ -0,0 +1 @@ +{"ID": "9efe721d-bb9b-4449-8c6b-9f2fef31eb66", "effective_cve": "CVE-2019-9923", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "TP", "package": {"name": "tar", "version": "1.30+dfsg-5"}, "timestamp": "2024-06-10T15:14:15.796684+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-9923"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9fb3dfce-d654-4895-84be-48117fccae70.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9fb3dfce-d654-4895-84be-48117fccae70.json new file mode 100644 index 00000000..7a77c3db --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/9fb3dfce-d654-4895-84be-48117fccae70.json @@ -0,0 +1 @@ +{"ID": "9fb3dfce-d654-4895-84be-48117fccae70", "effective_cve": "CVE-2017-16231", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libpcre3", "version": "2:8.39-12"}, "timestamp": "2024-06-10T15:13:02.830875+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-16231"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/a50c0327-1ea0-4915-b7f6-83bf80dc748e.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/a50c0327-1ea0-4915-b7f6-83bf80dc748e.json new file mode 100644 index 00000000..9d575daf --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/a50c0327-1ea0-4915-b7f6-83bf80dc748e.json @@ -0,0 +1 @@ +{"ID": "a50c0327-1ea0-4915-b7f6-83bf80dc748e", "effective_cve": "CVE-2019-1010022", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc-bin", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:11:29.139629+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010022"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/ab5ca65e-509f-4c7c-b74b-c6b489b873aa.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/ab5ca65e-509f-4c7c-b74b-c6b489b873aa.json new file mode 100644 index 00000000..19f25fc3 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/ab5ca65e-509f-4c7c-b74b-c6b489b873aa.json @@ -0,0 +1 @@ +{"ID": "ab5ca65e-509f-4c7c-b74b-c6b489b873aa", "effective_cve": "CVE-2019-1010025", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc6", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:15.087346+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010025"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/c26c8578-aef0-4c28-831f-15722f5bbf7d.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/c26c8578-aef0-4c28-831f-15722f5bbf7d.json new file mode 100644 index 00000000..11df9280 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/c26c8578-aef0-4c28-831f-15722f5bbf7d.json @@ -0,0 +1 @@ +{"ID": "c26c8578-aef0-4c28-831f-15722f5bbf7d", "effective_cve": "CVE-2017-18018", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "FP", "package": {"name": "coreutils", "version": "8.30-1ubuntu1"}, "timestamp": "2024-06-10T15:08:16.846188+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2017-18018"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/d39e4ae0-7a3f-4380-bd21-0e5bc171b2d3.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/d39e4ae0-7a3f-4380-bd21-0e5bc171b2d3.json new file mode 100644 index 00000000..dd966481 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/d39e4ae0-7a3f-4380-bd21-0e5bc171b2d3.json @@ -0,0 +1 @@ +{"ID": "d39e4ae0-7a3f-4380-bd21-0e5bc171b2d3", "effective_cve": "CVE-2019-1010023", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc6", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:13.470324+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-1010023"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/d3d3ec35-da12-4084-9113-d408b1f11b70.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/d3d3ec35-da12-4084-9113-d408b1f11b70.json new file mode 100644 index 00000000..ce2b5595 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/d3d3ec35-da12-4084-9113-d408b1f11b70.json @@ -0,0 +1 @@ +{"ID": "d3d3ec35-da12-4084-9113-d408b1f11b70", "effective_cve": "CVE-2019-19126", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libc6", "version": "2.29-0ubuntu2"}, "timestamp": "2024-06-10T15:12:15.712563+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-19126"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/ebcfcbdf-a64b-46c6-81ee-cddc575e97f1.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/ebcfcbdf-a64b-46c6-81ee-cddc575e97f1.json new file mode 100644 index 00000000..5fa4740e --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/ebcfcbdf-a64b-46c6-81ee-cddc575e97f1.json @@ -0,0 +1 @@ +{"ID": "ebcfcbdf-a64b-46c6-81ee-cddc575e97f1", "effective_cve": "CVE-2019-15847", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libstdc++6", "version": "9.1.0-2ubuntu2~19.04"}, "timestamp": "2024-06-10T15:13:05.952386+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-15847"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/f60ea49c-b6cb-4b4d-85a4-6e08fb3bebce.json b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/f60ea49c-b6cb-4b4d-85a4-6e08fb3bebce.json new file mode 100644 index 00000000..5692d0f5 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58/f60ea49c-b6cb-4b4d-85a4-6e08fb3bebce.json @@ -0,0 +1 @@ +{"ID": "f60ea49c-b6cb-4b4d-85a4-6e08fb3bebce", "effective_cve": "CVE-2019-15847", "image": {"exact": "docker.io/ubuntu@sha256:3db17bfc30b41cc18552578f4a66d7010050eb9fdc42bf6c3d82bb0dcdf88d58"}, "label": "??", "package": {"name": "libgcc1", "version": "1:9.1.0-2ubuntu2~19.04"}, "timestamp": "2024-06-10T15:12:38.827018+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2019-15847"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:80fb4ea0c0a384a3072a6be1879c342bb636b0d105209535ba893ba75ab38ede/720467c5-fdbd-4fef-b355-4fbe1cc048f6.json b/labels/docker.io+ubuntu@sha256:80fb4ea0c0a384a3072a6be1879c342bb636b0d105209535ba893ba75ab38ede/720467c5-fdbd-4fef-b355-4fbe1cc048f6.json new file mode 100644 index 00000000..ffe6f932 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:80fb4ea0c0a384a3072a6be1879c342bb636b0d105209535ba893ba75ab38ede/720467c5-fdbd-4fef-b355-4fbe1cc048f6.json @@ -0,0 +1 @@ +{"ID": "720467c5-fdbd-4fef-b355-4fbe1cc048f6", "effective_cve": "CVE-2021-46848", "image": {"exact": "docker.io/ubuntu@sha256:80fb4ea0c0a384a3072a6be1879c342bb636b0d105209535ba893ba75ab38ede"}, "label": "??", "package": {"name": "libtasn1-6", "version": "4.18.0-4build1"}, "timestamp": "2024-06-10T15:18:16.937341+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2021-46848"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/03096ab9-b6ac-4e45-a0fd-bf1c1a63ce77.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/03096ab9-b6ac-4e45-a0fd-bf1c1a63ce77.json new file mode 100644 index 00000000..d4f88147 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/03096ab9-b6ac-4e45-a0fd-bf1c1a63ce77.json @@ -0,0 +1 @@ +{"ID": "03096ab9-b6ac-4e45-a0fd-bf1c1a63ce77", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "libfdisk1", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:15:13.836776+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/072a1ae9-d0e2-46a4-9860-c9fd2226733e.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/072a1ae9-d0e2-46a4-9860-c9fd2226733e.json new file mode 100644 index 00000000..4fefcb58 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/072a1ae9-d0e2-46a4-9860-c9fd2226733e.json @@ -0,0 +1 @@ +{"ID": "072a1ae9-d0e2-46a4-9860-c9fd2226733e", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "util-linux", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:21:18.552776+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/0c0a3c8e-97a0-486a-b828-4821b437ceeb.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/0c0a3c8e-97a0-486a-b828-4821b437ceeb.json new file mode 100644 index 00000000..9912da6e --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/0c0a3c8e-97a0-486a-b828-4821b437ceeb.json @@ -0,0 +1 @@ +{"ID": "0c0a3c8e-97a0-486a-b828-4821b437ceeb", "effective_cve": "CVE-2017-1000082", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-1000082 indicates not-affected for newer and older entries, so likely that yakkety should have been unaffected as well", "package": {"name": "libudev1", "version": "231-9ubuntu5"}, "timestamp": "2024-06-07T08:57:08.088513+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-1000082"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/1a062212-6132-4bce-ab9b-7ddd547fd14f.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/1a062212-6132-4bce-ab9b-7ddd547fd14f.json new file mode 100644 index 00000000..64c8899b --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/1a062212-6132-4bce-ab9b-7ddd547fd14f.json @@ -0,0 +1 @@ +{"ID": "1a062212-6132-4bce-ab9b-7ddd547fd14f", "effective_cve": "CVE-2017-11164", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2017-11164 strongly indicates yakkety would have also been affected", "package": {"name": "libpcre3", "version": "2:8.39-2"}, "timestamp": "2024-06-07T09:54:43.647691+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11164"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/1ca2ad76-1ad1-49ab-b101-27848c9a9d6e.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/1ca2ad76-1ad1-49ab-b101-27848c9a9d6e.json new file mode 100644 index 00000000..f6d2a8d3 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/1ca2ad76-1ad1-49ab-b101-27848c9a9d6e.json @@ -0,0 +1 @@ +{"ID": "1ca2ad76-1ad1-49ab-b101-27848c9a9d6e", "effective_cve": "CVE-2017-10989", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-10989 indicates xenial was affected and checking the yakkety sqlite version indicates it should be considered so as well", "package": {"name": "libsqlite3-0", "version": "3.14.1-1build1"}, "timestamp": "2024-06-07T09:49:41.611732+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-10989"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/229b82d9-c944-4fb9-ab57-bef4adb0c18b.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/229b82d9-c944-4fb9-ab57-bef4adb0c18b.json new file mode 100644 index 00000000..e13aea77 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/229b82d9-c944-4fb9-ab57-bef4adb0c18b.json @@ -0,0 +1 @@ +{"ID": "229b82d9-c944-4fb9-ab57-bef4adb0c18b", "effective_cve": "CVE-2017-11113", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11113 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libtinfo5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:52:34.041740+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11113"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/26d32875-c82d-4f29-be07-cbebbff674a9.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/26d32875-c82d-4f29-be07-cbebbff674a9.json new file mode 100644 index 00000000..7701c8f1 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/26d32875-c82d-4f29-be07-cbebbff674a9.json @@ -0,0 +1 @@ +{"ID": "26d32875-c82d-4f29-be07-cbebbff674a9", "effective_cve": "CVE-2017-10684", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-10684 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "ncurses-bin", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:45:01.397910+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-10684"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3159d2ec-f4d4-499a-9a42-35a00d85c5d9.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3159d2ec-f4d4-499a-9a42-35a00d85c5d9.json new file mode 100644 index 00000000..a3067467 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3159d2ec-f4d4-499a-9a42-35a00d85c5d9.json @@ -0,0 +1 @@ +{"ID": "3159d2ec-f4d4-499a-9a42-35a00d85c5d9", "effective_cve": "CVE-2016-9842", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2016-9842 indicates a fix released for xenial so highly likely yakkety would have also required a fix if still supported", "package": {"name": "zlib1g", "version": "1:1.2.8.dfsg-2ubuntu5.1"}, "timestamp": "2024-06-07T08:51:44.016285+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9842"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/33121484-ceeb-4cf2-ba72-7a752031a004.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/33121484-ceeb-4cf2-ba72-7a752031a004.json new file mode 100644 index 00000000..317a4d21 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/33121484-ceeb-4cf2-ba72-7a752031a004.json @@ -0,0 +1 @@ +{"ID": "33121484-ceeb-4cf2-ba72-7a752031a004", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "libsmartcols1", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:20:32.803962+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3b722c51-bacc-4699-bd69-beaefec62a0e.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3b722c51-bacc-4699-bd69-beaefec62a0e.json new file mode 100644 index 00000000..f797c0fe --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3b722c51-bacc-4699-bd69-beaefec62a0e.json @@ -0,0 +1 @@ +{"ID": "3b722c51-bacc-4699-bd69-beaefec62a0e", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "libblkid1", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:14:59.558824+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3e032f4a-457a-4ae4-9750-e8be6ba570f7.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3e032f4a-457a-4ae4-9750-e8be6ba570f7.json new file mode 100644 index 00000000..5d318162 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/3e032f4a-457a-4ae4-9750-e8be6ba570f7.json @@ -0,0 +1 @@ +{"ID": "3e032f4a-457a-4ae4-9750-e8be6ba570f7", "effective_cve": "CVE-2017-11112", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11112 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libtinfo5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:51:40.774751+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11112"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/42518c99-5020-4c02-9f46-02c61d23f319.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/42518c99-5020-4c02-9f46-02c61d23f319.json new file mode 100644 index 00000000..e9dcba7d --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/42518c99-5020-4c02-9f46-02c61d23f319.json @@ -0,0 +1 @@ +{"ID": "42518c99-5020-4c02-9f46-02c61d23f319", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "libmount1", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:15:40.241783+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/461cb094-12e7-4d05-a4ff-f0b2ab187035.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/461cb094-12e7-4d05-a4ff-f0b2ab187035.json new file mode 100644 index 00000000..55f34df1 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/461cb094-12e7-4d05-a4ff-f0b2ab187035.json @@ -0,0 +1 @@ +{"ID": "461cb094-12e7-4d05-a4ff-f0b2ab187035", "effective_cve": "CVE-2017-11113", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11113 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "ncurses-base", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:52:34.502023+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11113"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/4f6ac22c-1e85-47df-88f7-d1ee4cee5a20.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/4f6ac22c-1e85-47df-88f7-d1ee4cee5a20.json new file mode 100644 index 00000000..b9b945ed --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/4f6ac22c-1e85-47df-88f7-d1ee4cee5a20.json @@ -0,0 +1 @@ +{"ID": "4f6ac22c-1e85-47df-88f7-d1ee4cee5a20", "effective_cve": "CVE-2017-11112", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11112 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libncurses5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:51:39.841361+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11112"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/57bb01dd-aeab-46db-be53-772be3c5729c.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/57bb01dd-aeab-46db-be53-772be3c5729c.json new file mode 100644 index 00000000..b6539996 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/57bb01dd-aeab-46db-be53-772be3c5729c.json @@ -0,0 +1 @@ +{"ID": "57bb01dd-aeab-46db-be53-772be3c5729c", "effective_cve": "CVE-2017-10684", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-10684 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "ncurses-base", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:45:00.929475+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-10684"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/61234c95-c37b-4dd2-b735-4d30cd7b2c4f.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/61234c95-c37b-4dd2-b735-4d30cd7b2c4f.json new file mode 100644 index 00000000..34044f5b --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/61234c95-c37b-4dd2-b735-4d30cd7b2c4f.json @@ -0,0 +1 @@ +{"ID": "61234c95-c37b-4dd2-b735-4d30cd7b2c4f", "effective_cve": "CVE-2017-10684", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-10684 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libtinfo5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:45:00.462082+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-10684"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/620a64f4-7783-4fdc-8cd3-1cc085cf63c9.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/620a64f4-7783-4fdc-8cd3-1cc085cf63c9.json new file mode 100644 index 00000000..65c3fd21 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/620a64f4-7783-4fdc-8cd3-1cc085cf63c9.json @@ -0,0 +1 @@ +{"ID": "620a64f4-7783-4fdc-8cd3-1cc085cf63c9", "effective_cve": "CVE-2017-10684", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-10684 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libncursesw5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:44:59.994765+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-10684"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/6d1db107-1362-437d-881a-2bba008cf57a.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/6d1db107-1362-437d-881a-2bba008cf57a.json new file mode 100644 index 00000000..d05b7704 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/6d1db107-1362-437d-881a-2bba008cf57a.json @@ -0,0 +1 @@ +{"ID": "6d1db107-1362-437d-881a-2bba008cf57a", "effective_cve": "CVE-2017-11112", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11112 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "ncurses-base", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:51:41.242603+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11112"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/7723dd06-ed93-4dee-a11f-d956d7d70692.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/7723dd06-ed93-4dee-a11f-d956d7d70692.json new file mode 100644 index 00000000..88900a3f --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/7723dd06-ed93-4dee-a11f-d956d7d70692.json @@ -0,0 +1 @@ +{"ID": "7723dd06-ed93-4dee-a11f-d956d7d70692", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "bsdutils", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:14:38.883276+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/8b638e4b-da08-4332-a6cc-39c2de99ef11.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/8b638e4b-da08-4332-a6cc-39c2de99ef11.json new file mode 100644 index 00000000..a6b4aadb --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/8b638e4b-da08-4332-a6cc-39c2de99ef11.json @@ -0,0 +1 @@ +{"ID": "8b638e4b-da08-4332-a6cc-39c2de99ef11", "effective_cve": "CVE-2017-11113", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11113 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libncursesw5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:52:33.575420+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11113"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/8c7b5b42-c374-43d3-9b19-5a13c04e506d.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/8c7b5b42-c374-43d3-9b19-5a13c04e506d.json new file mode 100644 index 00000000..12173877 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/8c7b5b42-c374-43d3-9b19-5a13c04e506d.json @@ -0,0 +1 @@ +{"ID": "8c7b5b42-c374-43d3-9b19-5a13c04e506d", "effective_cve": "CVE-2017-1000082", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-1000082 indicates not-affected for newer and older entries, so likely that yakkety should have been unaffected as well", "package": {"name": "libsystemd0", "version": "231-9ubuntu5"}, "timestamp": "2024-06-07T08:56:34.199633+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-1000082"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/92c326e0-4fd3-4e09-a98b-8ecd8d96f5c9.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/92c326e0-4fd3-4e09-a98b-8ecd8d96f5c9.json new file mode 100644 index 00000000..c19d2e25 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/92c326e0-4fd3-4e09-a98b-8ecd8d96f5c9.json @@ -0,0 +1 @@ +{"ID": "92c326e0-4fd3-4e09-a98b-8ecd8d96f5c9", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "mount", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:18:58.174856+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/975fe621-3a75-48d0-8f65-72698e22ff4e.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/975fe621-3a75-48d0-8f65-72698e22ff4e.json new file mode 100644 index 00000000..7e4c6117 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/975fe621-3a75-48d0-8f65-72698e22ff4e.json @@ -0,0 +1 @@ +{"ID": "975fe621-3a75-48d0-8f65-72698e22ff4e", "effective_cve": "CVE-2017-10684", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-10684 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libncurses5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:44:59.527741+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-10684"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/a4b63a4e-7b55-49a1-89f2-96de32aac391.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/a4b63a4e-7b55-49a1-89f2-96de32aac391.json new file mode 100644 index 00000000..98a6b82d --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/a4b63a4e-7b55-49a1-89f2-96de32aac391.json @@ -0,0 +1 @@ +{"ID": "a4b63a4e-7b55-49a1-89f2-96de32aac391", "effective_cve": "CVE-2017-2616", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "FP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-2616 indicates util-linux is not affected and util-linux is the source package in this case", "package": {"name": "libuuid1", "version": "1:2.28.2-1ubuntu1.2"}, "timestamp": "2024-06-07T08:21:06.901706+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-2616"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/a5ef7d0b-8a8f-48db-b2b6-fd3bc491e45e.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/a5ef7d0b-8a8f-48db-b2b6-fd3bc491e45e.json new file mode 100644 index 00000000..d71874e2 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/a5ef7d0b-8a8f-48db-b2b6-fd3bc491e45e.json @@ -0,0 +1 @@ +{"ID": "a5ef7d0b-8a8f-48db-b2b6-fd3bc491e45e", "effective_cve": "CVE-2017-11112", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11112 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "ncurses-bin", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:51:41.708831+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11112"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/c21b6fec-c503-49a6-aa93-75cac6b566c4.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/c21b6fec-c503-49a6-aa93-75cac6b566c4.json new file mode 100644 index 00000000..bcd2f39a --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/c21b6fec-c503-49a6-aa93-75cac6b566c4.json @@ -0,0 +1 @@ +{"ID": "c21b6fec-c503-49a6-aa93-75cac6b566c4", "effective_cve": "CVE-2016-9841", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2016-9841 indicates a fix released for xenial so highly likely yakkety would have also required a fix if still supported", "package": {"name": "zlib1g", "version": "1:1.2.8.dfsg-2ubuntu5.1"}, "timestamp": "2024-06-07T08:50:56.806404+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9841"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/c8685f31-9d8e-4d0f-9d09-a4fb4b52cabc.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/c8685f31-9d8e-4d0f-9d09-a4fb4b52cabc.json new file mode 100644 index 00000000..c68c6aa1 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/c8685f31-9d8e-4d0f-9d09-a4fb4b52cabc.json @@ -0,0 +1 @@ +{"ID": "c8685f31-9d8e-4d0f-9d09-a4fb4b52cabc", "effective_cve": "CVE-2017-11112", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11112 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libncursesw5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:51:40.309170+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11112"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/d150a6ef-9d61-4d70-a491-fa9ed7292915.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/d150a6ef-9d61-4d70-a491-fa9ed7292915.json new file mode 100644 index 00000000..41b6aac4 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/d150a6ef-9d61-4d70-a491-fa9ed7292915.json @@ -0,0 +1 @@ +{"ID": "d150a6ef-9d61-4d70-a491-fa9ed7292915", "effective_cve": "CVE-2016-9840", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2016-9840 indicates a fix released for xenial so highly likely yakkety would have also required a fix if still supported", "package": {"name": "zlib1g", "version": "1:1.2.8.dfsg-2ubuntu5.1"}, "timestamp": "2024-06-07T08:47:30.551612+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9840"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/ec5c28ac-2642-44bf-8dcd-31831c4adfcc.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/ec5c28ac-2642-44bf-8dcd-31831c4adfcc.json new file mode 100644 index 00000000..7c3b1094 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/ec5c28ac-2642-44bf-8dcd-31831c4adfcc.json @@ -0,0 +1 @@ +{"ID": "ec5c28ac-2642-44bf-8dcd-31831c4adfcc", "effective_cve": "CVE-2017-11113", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11113 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "libncurses5", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:52:33.093447+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11113"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/ed755a18-cf99-439c-b8b8-3a445d072bde.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/ed755a18-cf99-439c-b8b8-3a445d072bde.json new file mode 100644 index 00000000..8f379bc5 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/ed755a18-cf99-439c-b8b8-3a445d072bde.json @@ -0,0 +1 @@ +{"ID": "ed755a18-cf99-439c-b8b8-3a445d072bde", "effective_cve": "CVE-2016-9843", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2016-9843 indicates a fix released for xenial so highly likely yakkety would have also required a fix if still supported", "package": {"name": "zlib1g", "version": "1:1.2.8.dfsg-2ubuntu5.1"}, "timestamp": "2024-06-07T08:52:01.652518+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2016-9843"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/f8d4ead6-d1fe-47ae-b017-a742be588ee1.json b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/f8d4ead6-d1fe-47ae-b017-a742be588ee1.json new file mode 100644 index 00000000..4a93fdb1 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a/f8d4ead6-d1fe-47ae-b017-a742be588ee1.json @@ -0,0 +1 @@ +{"ID": "f8d4ead6-d1fe-47ae-b017-a742be588ee1", "effective_cve": "CVE-2017-11113", "image": {"exact": "docker.io/ubuntu@sha256:8dc9652808dc091400d7d5983949043a9f9c7132b15c14814275d25f94bca18a"}, "label": "TP", "note": "https://git.launchpad.net/ubuntu-cve-tracker/tree/retired/CVE-2017-11113 indicates v6.0 lines of curses required patches and looking back yakkety was 6.0 so likely would have also been affected", "package": {"name": "ncurses-bin", "version": "6.0+20160625-1ubuntu1"}, "timestamp": "2024-06-07T09:52:34.968286+00:00", "user": "westonsteimel", "vulnerability_id": "CVE-2017-11113"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d/6044fe0a-1900-4429-a415-8502c0316f41.json b/labels/docker.io+ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d/6044fe0a-1900-4429-a415-8502c0316f41.json new file mode 100644 index 00000000..606b6009 --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d/6044fe0a-1900-4429-a415-8502c0316f41.json @@ -0,0 +1 @@ +{"ID": "6044fe0a-1900-4429-a415-8502c0316f41", "effective_cve": "CVE-2021-46848", "image": {"exact": "docker.io/ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d"}, "label": "??", "package": {"name": "libtasn1-6", "version": "4.18.0-4build1"}, "timestamp": "2024-06-10T15:16:55.932227+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2021-46848"} \ No newline at end of file diff --git a/labels/docker.io+ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d/7d57f64f-fb9e-4611-8b2a-032e7ba6da25.json b/labels/docker.io+ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d/7d57f64f-fb9e-4611-8b2a-032e7ba6da25.json new file mode 100644 index 00000000..15c0551c --- /dev/null +++ b/labels/docker.io+ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d/7d57f64f-fb9e-4611-8b2a-032e7ba6da25.json @@ -0,0 +1 @@ +{"ID": "7d57f64f-fb9e-4611-8b2a-032e7ba6da25", "effective_cve": "CVE-2020-22916", "image": {"exact": "docker.io/ubuntu@sha256:aa6c2c047467afc828e77e306041b7fa4a65734fe3449a54aa9c280822b0d87d"}, "label": "??", "package": {"name": "liblzma5", "version": "5.2.5-2ubuntu1"}, "timestamp": "2024-06-10T15:16:23.746131+00:00", "tool": "grype@v0.78.0", "user": "westonsteimel", "vulnerability_id": "CVE-2020-22916"} \ No newline at end of file