bash |
CVE-2019-18276 |
LOW |
5.0-6ubuntu1.1 |
|
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://www.youtube.com/watch?v=-wGtxJ8opa8
|
bsdutils |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
bsdutils |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
coreutils |
CVE-2016-2781 |
LOW |
8.30-3ubuntu2 |
|
Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/
|
fdisk |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
fdisk |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
git |
CVE-2018-1000021 |
LOW |
1:2.25.1-1ubuntu3.2 |
|
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
git-man |
CVE-2018-1000021 |
LOW |
1:2.25.1-1ubuntu3.2 |
|
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
libapparmor1 |
CVE-2016-1585 |
MEDIUM |
2.13.3-7ubuntu5.1 |
|
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libasn1-8-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libblkid1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libblkid1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libc-bin |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-bin |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-bin |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc6 |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libexpat1 |
CVE-2022-25235 |
HIGH |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235 https://github.com/libexpat/libexpat/pull/562 https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix) https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2022-25236 |
HIGH |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236 https://github.com/libexpat/libexpat/pull/561 https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test) https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix) https://github.com/libexpat/libexpat/pull/577 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2021-46143 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143 https://github.com/libexpat/libexpat/issues/532 https://github.com/libexpat/libexpat/pull/538 https://security.netapp.com/advisory/ntap-20220121-0006/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22822 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822 https://github.com/libexpat/libexpat/pull/539 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22823 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823 https://github.com/libexpat/libexpat/pull/539 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22824 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824 https://github.com/libexpat/libexpat/pull/539 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22825 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825 https://github.com/libexpat/libexpat/pull/539 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22826 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826 https://github.com/libexpat/libexpat/pull/539 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22827 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827 https://github.com/libexpat/libexpat/pull/539 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-23852 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852 https://github.com/libexpat/libexpat/pull/550 https://security.netapp.com/advisory/ntap-20220217-0001/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-23990 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990 https://github.com/libexpat/libexpat/pull/551 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-25314 |
MEDIUM |
2.2.9-1build1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314 https://github.com/libexpat/libexpat/pull/560 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://security.netapp.com/advisory/ntap-20220303-0008/ https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2021-45960 |
LOW |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://bugzilla.mozilla.org/show_bug.cgi?id=1217609 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960 https://github.com/libexpat/libexpat/issues/531 https://github.com/libexpat/libexpat/pull/534 https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea https://security.netapp.com/advisory/ntap-20220121-0004/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libfdisk1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libfdisk1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libgd3 |
CVE-2021-40812 |
LOW |
2.2.5-5.2ubuntu2.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812 https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9 https://github.com/libgd/libgd/issues/750#issuecomment-914872385 https://github.com/libgd/libgd/issues/757
|
libgmp10 |
CVE-2021-43618 |
LOW |
2:6.2.0+dfsg-4 |
|
Expand...https://bugs.debian.org/994405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
libgssapi-krb5-2 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgssapi-krb5-2 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libgssapi3-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhcrypto4-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimbase1-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimntlm0-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhx509-5-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libjbig0 |
CVE-2017-9937 |
LOW |
2.1-3.1build1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjpeg-turbo8 |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html
|
libk5crypto3 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libk5crypto3 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5-26-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libkrb5-3 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5-3 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5support0 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5support0 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libmount1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libmount1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libnginx-mod-http-image-filter |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
libnginx-mod-http-image-filter |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-image-filter |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-xslt-filter |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
libnginx-mod-http-xslt-filter |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-xslt-filter |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-mail |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
libnginx-mod-mail |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-mail |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-stream |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
libnginx-mod-stream |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-stream |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libpcre3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libperl5.30 |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
libpython3.8-minimal |
CVE-2021-4189 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
|
libpython3.8-minimal |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://security.netapp.com/advisory/ntap-20220225-0009/
|
libpython3.8-minimal |
CVE-2021-23336 |
LOW |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336 https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master) https://github.com/python/cpython/pull/24297 https://linux.oracle.com/cve/CVE-2021-23336.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/ https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210326-0004/ https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/ https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933 https://ubuntu.com/security/notices/USN-4742-1 https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpython3.8-stdlib |
CVE-2021-4189 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
|
libpython3.8-stdlib |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://security.netapp.com/advisory/ntap-20220225-0009/
|
libpython3.8-stdlib |
CVE-2021-23336 |
LOW |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336 https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master) https://github.com/python/cpython/pull/24297 https://linux.oracle.com/cve/CVE-2021-23336.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/ https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210326-0004/ https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/ https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933 https://ubuntu.com/security/notices/USN-4742-1 https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libroken18-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libsasl2-2 |
CVE-2022-24407 |
HIGH |
2.1.27+dfsg-2 |
2.1.27+dfsg-2ubuntu0.1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-0666.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsasl2-modules-db |
CVE-2022-24407 |
HIGH |
2.1.27+dfsg-2 |
2.1.27+dfsg-2ubuntu0.1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-0666.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsepol1 |
CVE-2021-36084 |
LOW |
3.0-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36085 |
LOW |
3.0-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36086 |
LOW |
3.0-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36087 |
LOW |
3.0-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
|
libsmartcols1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libsmartcols1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libsqlite3-0 |
CVE-2020-9794 |
MEDIUM |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 https://vuldb.com/?id.155768
|
libsqlite3-0 |
CVE-2020-9849 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
libsqlite3-0 |
CVE-2020-9991 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211847 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/kb/HT211846 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
libsqlite3-0 |
CVE-2021-36690 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
libtasn1-6 |
CVE-2018-1000654 |
LOW |
4.16.0-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html http://www.securityfocus.com/bid/105151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654 https://gitlab.com/gnutls/libtasn1/issues/4 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2018-10126 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2020-35522 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtiff5 |
CVE-2022-0561 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
|
libtiff5 |
CVE-2022-0562 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
|
libtiff5 |
CVE-2022-22844 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
|
libuuid1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libuuid1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libwind0-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libxslt1.1 |
CVE-2015-9019 |
LOW |
1.1.34-4 |
|
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400 https://bugzilla.suse.com/show_bug.cgi?id=934119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
|
locales |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
locales |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
locales |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
locales |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
locales |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
locales |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
login |
CVE-2013-4235 |
LOW |
1:4.8.1-1ubuntu5.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
mount |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
mount |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
nginx |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
nginx |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
nginx |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
nginx-common |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
nginx-common |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
nginx-common |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
nginx-core |
CVE-2020-11724 |
MEDIUM |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11724 https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html https://security.netapp.com/advisory/ntap-20210129-0002/ https://www.debian.org/security/2020/dsa-4750
|
nginx-core |
CVE-2020-36309 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
nginx-core |
CVE-2021-3618 |
LOW |
1.18.0-0ubuntu1.2 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
passwd |
CVE-2013-4235 |
LOW |
1:4.8.1-1ubuntu5.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
perl |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-base |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-modules-5.30 |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
php7.4-cli |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-cli |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-cli |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-cli |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-cli |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-cli |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-cli |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-cli |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-common |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-common |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-common |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-common |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-common |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-common |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-common |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-common |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-curl |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-curl |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-curl |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-curl |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-curl |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-curl |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-curl |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-curl |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-fpm |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-fpm |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-fpm |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-fpm |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-fpm |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-fpm |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-fpm |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-fpm |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-gd |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-gd |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-gd |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-gd |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-gd |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-gd |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-gd |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-gd |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-intl |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-intl |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-intl |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-intl |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-intl |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-intl |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-intl |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-intl |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-json |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-json |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-json |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-json |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-json |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-json |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-json |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-json |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-mbstring |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-mbstring |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-mbstring |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-mbstring |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-mbstring |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-mbstring |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-mbstring |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-mbstring |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-opcache |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-opcache |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-opcache |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-opcache |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-opcache |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-opcache |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-opcache |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-opcache |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-pgsql |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-pgsql |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-pgsql |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-pgsql |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-pgsql |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-pgsql |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-pgsql |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-pgsql |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-phpdbg |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-phpdbg |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-phpdbg |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-phpdbg |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-phpdbg |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-phpdbg |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-phpdbg |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-phpdbg |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-readline |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-readline |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-readline |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-readline |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-readline |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-readline |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-readline |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-readline |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-xml |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-xml |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-xml |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-xml |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-xml |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-xml |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-xml |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-xml |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
php7.4-zip |
CVE-2017-9118 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-zip |
CVE-2017-9120 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://access.redhat.com/errata/RHSA-2019:2519 https://bugs.php.net/bug.php?id=74544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9120 https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-zip |
CVE-2021-21708 |
MEDIUM |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.9 |
Expand...https://bugs.php.net/bug.php?id=81708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708 https://nakedsecurity.sophos.com/2022/02/18/irony-alert-php-fixes-security-flaw-in-input-validation-code/ https://ubuntu.com/security/notices/USN-5303-1 https://www.php.net/ChangeLog-7.php#PHP_7_4 https://www.php.net/ChangeLog-8.php#PHP_8_1
|
php7.4-zip |
CVE-2016-9138 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...http://git.php.net/?p=php-src.git;a=commitdiff;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f;hp=e1709b7e588cbda71c577f6e5b701713d0c70a23 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.openwall.com/lists/oss-security/2016/11/01/7 http://www.securityfocus.com/bid/95268 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138 https://github.com/php/php-src/commit/0e6fe3a4c96be2d3e88389a5776f878021b4c59f
|
php7.4-zip |
CVE-2017-7189 |
LOW |
7.4.3-4ubuntu2.8 |
|
Expand...https://bugs.php.net/bug.php?id=74192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7189 https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
|
php7.4-zip |
CVE-2017-8923 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98518 https://bugs.php.net/bug.php?id=74577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923 https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3
|
php7.4-zip |
CVE-2017-9119 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/98596 https://bugs.php.net/bug.php?id=74593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9119 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2
|
php7.4-zip |
CVE-2021-21707 |
LOW |
7.4.3-4ubuntu2.8 |
7.4.3-4ubuntu2.10 |
Expand...https://bugs.php.net/bug.php?id=79971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707 https://security.netapp.com/advisory/ntap-20211223-0005/ https://ubuntu.com/security/notices/USN-5300-1 https://ubuntu.com/security/notices/USN-5300-2 https://ubuntu.com/security/notices/USN-5300-3 https://www.debian.org/security/2022/dsa-5082
|
python3.8 |
CVE-2021-4189 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
|
python3.8 |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://security.netapp.com/advisory/ntap-20220225-0009/
|
python3.8 |
CVE-2021-23336 |
LOW |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336 https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master) https://github.com/python/cpython/pull/24297 https://linux.oracle.com/cve/CVE-2021-23336.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/ https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210326-0004/ https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/ https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933 https://ubuntu.com/security/notices/USN-4742-1 https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
python3.8-minimal |
CVE-2021-4189 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
|
python3.8-minimal |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://security.netapp.com/advisory/ntap-20220225-0009/
|
python3.8-minimal |
CVE-2021-23336 |
LOW |
3.8.10-0ubuntu1~20.04.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336 https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master) https://github.com/python/cpython/pull/24297 https://linux.oracle.com/cve/CVE-2021-23336.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/ https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210326-0004/ https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/ https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933 https://ubuntu.com/security/notices/USN-4742-1 https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
util-linux |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
util-linux |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
vim-common |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
|
vim-common |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
vim-common |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
|
vim-common |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
|
vim-common |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
|
vim-tiny |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
|
vim-tiny |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
vim-tiny |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
|
vim-tiny |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
|
vim-tiny |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
|
xxd |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
|
xxd |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
xxd |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
|
xxd |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
|
xxd |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5.7 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
|