apt |
CVE-2020-27350 |
MEDIUM |
1.8.2.1 |
1.8.2.2 |
Expand...https://bugs.launchpad.net/bugs/1899193 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27350 https://security.netapp.com/advisory/ntap-20210108-0005/ https://ubuntu.com/security/notices/USN-4667-1 https://ubuntu.com/security/notices/USN-4667-2 https://usn.ubuntu.com/usn/usn-4667-1 https://www.debian.org/security/2020/dsa-4808
|
apt |
CVE-2011-3374 |
LOW |
1.8.2.1 |
|
Expand...https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374
|
bash |
CVE-2019-18276 |
LOW |
5.0-4 |
|
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://www.youtube.com/watch?v=-wGtxJ8opa8
|
bsdutils |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
coreutils |
CVE-2016-2781 |
LOW |
8.30-3 |
|
Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/
|
coreutils |
CVE-2017-18018 |
LOW |
8.30-3 |
|
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
|
exim4-base |
CVE-2021-38371 |
HIGH |
4.92-8+deb10u6 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371 https://nostarttls.secvuln.info https://www.exim.org https://www.exim.org/static/doc/security/CVE-2021-38371.txt
|
exim4-config |
CVE-2021-38371 |
HIGH |
4.92-8+deb10u6 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371 https://nostarttls.secvuln.info https://www.exim.org https://www.exim.org/static/doc/security/CVE-2021-38371.txt
|
exim4-daemon-light |
CVE-2021-38371 |
HIGH |
4.92-8+deb10u6 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371 https://nostarttls.secvuln.info https://www.exim.org https://www.exim.org/static/doc/security/CVE-2021-38371.txt
|
fdisk |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
gcc-8-base |
CVE-2018-12886 |
HIGH |
8.3.0-6 |
|
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
gcc-8-base |
CVE-2019-15847 |
HIGH |
8.3.0-6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
gpgv |
CVE-2019-14855 |
LOW |
2.2.12-1+deb10u1 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855 https://dev.gnupg.org/T4755 https://eprint.iacr.org/2020/014.pdf https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html https://rwc.iacr.org/2020/slides/Leurent.pdf https://ubuntu.com/security/notices/USN-4516-1 https://usn.ubuntu.com/4516-1/
|
krb5-locales |
CVE-2021-37750 |
MEDIUM |
1.17-3+deb10u2 |
1.17-3+deb10u3 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
krb5-locales |
CVE-2004-0971 |
LOW |
1.17-3+deb10u2 |
|
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
krb5-locales |
CVE-2018-5709 |
LOW |
1.17-3+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libapt-pkg5.0 |
CVE-2020-27350 |
MEDIUM |
1.8.2.1 |
1.8.2.2 |
Expand...https://bugs.launchpad.net/bugs/1899193 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27350 https://security.netapp.com/advisory/ntap-20210108-0005/ https://ubuntu.com/security/notices/USN-4667-1 https://ubuntu.com/security/notices/USN-4667-2 https://usn.ubuntu.com/usn/usn-4667-1 https://www.debian.org/security/2020/dsa-4808
|
libapt-pkg5.0 |
CVE-2011-3374 |
LOW |
1.8.2.1 |
|
Expand...https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374
|
libblkid1 |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libc-bin |
CVE-2021-33574 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
libc-bin |
CVE-2021-35942 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions
|
libc-bin |
CVE-2022-23218 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
|
libc-bin |
CVE-2022-23219 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
|
libc-bin |
CVE-2020-1751 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751 https://linux.oracle.com/cve/CVE-2020-1751.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200430-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25423 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin |
CVE-2020-1752 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin |
CVE-2021-3326 |
HIGH |
2.28-10 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
|
libc-bin |
CVE-2021-3999 |
HIGH |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin |
CVE-2019-25013 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
|
libc-bin |
CVE-2020-10029 |
MEDIUM |
2.28-10 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin |
CVE-2020-27618 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
libc-bin |
CVE-2021-3998 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin |
CVE-2010-4756 |
LOW |
2.28-10 |
|
Expand...http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
|
libc-bin |
CVE-2016-10228 |
LOW |
2.28-10 |
|
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
libc-bin |
CVE-2018-20796 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/107160 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc-bin |
CVE-2019-1010022 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022
|
libc-bin |
CVE-2019-1010023 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109167 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023
|
libc-bin |
CVE-2019-1010024 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109162 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024
|
libc-bin |
CVE-2019-1010025 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025
|
libc-bin |
CVE-2019-19126 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-bin |
CVE-2019-9192 |
LOW |
2.28-10 |
|
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc-bin |
CVE-2020-6096 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-bin |
CVE-2021-27645 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462
|
libc-l10n |
CVE-2021-33574 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
libc-l10n |
CVE-2021-35942 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions
|
libc-l10n |
CVE-2022-23218 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
|
libc-l10n |
CVE-2022-23219 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
|
libc-l10n |
CVE-2020-1751 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751 https://linux.oracle.com/cve/CVE-2020-1751.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200430-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25423 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-l10n |
CVE-2020-1752 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-l10n |
CVE-2021-3326 |
HIGH |
2.28-10 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
|
libc-l10n |
CVE-2021-3999 |
HIGH |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-l10n |
CVE-2019-25013 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
|
libc-l10n |
CVE-2020-10029 |
MEDIUM |
2.28-10 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-l10n |
CVE-2020-27618 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
libc-l10n |
CVE-2021-3998 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-l10n |
CVE-2010-4756 |
LOW |
2.28-10 |
|
Expand...http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
|
libc-l10n |
CVE-2016-10228 |
LOW |
2.28-10 |
|
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
libc-l10n |
CVE-2018-20796 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/107160 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc-l10n |
CVE-2019-1010022 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022
|
libc-l10n |
CVE-2019-1010023 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109167 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023
|
libc-l10n |
CVE-2019-1010024 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109162 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024
|
libc-l10n |
CVE-2019-1010025 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025
|
libc-l10n |
CVE-2019-19126 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc-l10n |
CVE-2019-9192 |
LOW |
2.28-10 |
|
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc-l10n |
CVE-2020-6096 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-l10n |
CVE-2021-27645 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462
|
libc6 |
CVE-2021-33574 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
libc6 |
CVE-2021-35942 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions
|
libc6 |
CVE-2022-23218 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
|
libc6 |
CVE-2022-23219 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
|
libc6 |
CVE-2020-1751 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751 https://linux.oracle.com/cve/CVE-2020-1751.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200430-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25423 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 |
CVE-2020-1752 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 |
CVE-2021-3326 |
HIGH |
2.28-10 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
|
libc6 |
CVE-2021-3999 |
HIGH |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 |
CVE-2019-25013 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
|
libc6 |
CVE-2020-10029 |
MEDIUM |
2.28-10 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 |
CVE-2020-27618 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
libc6 |
CVE-2021-3998 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 |
CVE-2010-4756 |
LOW |
2.28-10 |
|
Expand...http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
|
libc6 |
CVE-2016-10228 |
LOW |
2.28-10 |
|
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
libc6 |
CVE-2018-20796 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/107160 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc6 |
CVE-2019-1010022 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022
|
libc6 |
CVE-2019-1010023 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109167 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023
|
libc6 |
CVE-2019-1010024 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109162 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024
|
libc6 |
CVE-2019-1010025 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025
|
libc6 |
CVE-2019-19126 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
libc6 |
CVE-2019-9192 |
LOW |
2.28-10 |
|
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
libc6 |
CVE-2020-6096 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc6 |
CVE-2021-27645 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462
|
libexpat1 |
CVE-2022-22822 |
CRITICAL |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/pull/539
|
libexpat1 |
CVE-2022-22823 |
CRITICAL |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/pull/539
|
libexpat1 |
CVE-2022-22824 |
CRITICAL |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/pull/539
|
libexpat1 |
CVE-2022-23852 |
CRITICAL |
2.2.6-2+deb10u1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852 https://github.com/libexpat/libexpat/pull/550
|
libexpat1 |
CVE-2022-23990 |
CRITICAL |
2.2.6-2+deb10u1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990 https://github.com/libexpat/libexpat/pull/551
|
libexpat1 |
CVE-2021-45960 |
HIGH |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://bugzilla.mozilla.org/show_bug.cgi?id=1217609 https://github.com/libexpat/libexpat/issues/531 https://github.com/libexpat/libexpat/pull/534 https://security.netapp.com/advisory/ntap-20220121-0004/
|
libexpat1 |
CVE-2021-46143 |
HIGH |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/issues/532 https://github.com/libexpat/libexpat/pull/538 https://security.netapp.com/advisory/ntap-20220121-0006/
|
libexpat1 |
CVE-2022-22825 |
HIGH |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/pull/539
|
libexpat1 |
CVE-2022-22826 |
HIGH |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/pull/539
|
libexpat1 |
CVE-2022-22827 |
HIGH |
2.2.6-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://github.com/libexpat/libexpat/pull/539
|
libexpat1 |
CVE-2013-0340 |
LOW |
2.2.6-2+deb10u1 |
|
Expand...http://openwall.com/lists/oss-security/2013/02/22/3 http://seclists.org/fulldisclosure/2021/Oct/61 http://seclists.org/fulldisclosure/2021/Oct/62 http://seclists.org/fulldisclosure/2021/Oct/63 http://seclists.org/fulldisclosure/2021/Sep/33 http://seclists.org/fulldisclosure/2021/Sep/34 http://seclists.org/fulldisclosure/2021/Sep/35 http://seclists.org/fulldisclosure/2021/Sep/38 http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 http://securitytracker.com/id?1028213 http://www.openwall.com/lists/oss-security/2013/04/12/6 http://www.openwall.com/lists/oss-security/2021/10/07/4 http://www.osvdb.org/90634 http://www.securityfocus.com/bid/58233 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E https://security.gentoo.org/glsa/201701-21 https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://support.apple.com/kb/HT212807 https://support.apple.com/kb/HT212814 https://support.apple.com/kb/HT212815 https://support.apple.com/kb/HT212819
|
libfdisk1 |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libgcc1 |
CVE-2018-12886 |
HIGH |
8.3.0-6 |
|
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
libgcc1 |
CVE-2019-15847 |
HIGH |
8.3.0-6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
libgcrypt20 |
CVE-2021-33560 |
HIGH |
1.8.4-5 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328 https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://eprint.iacr.org/2021/923 https://linux.oracle.com/cve/CVE-2021-33560.html https://linux.oracle.com/errata/ELSA-2021-4409.html https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/ https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgcrypt20 |
CVE-2019-13627 |
MEDIUM |
1.8.4-5 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html http://www.openwall.com/lists/oss-security/2019/10/02/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627 https://dev.gnupg.org/T4683 https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5 https://linux.oracle.com/cve/CVE-2019-13627.html https://linux.oracle.com/errata/ELSA-2020-4482.html https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html https://minerva.crocs.fi.muni.cz/ https://security-tracker.debian.org/tracker/CVE-2019-13627 https://security.gentoo.org/glsa/202003-32 https://ubuntu.com/security/notices/USN-4236-1 https://ubuntu.com/security/notices/USN-4236-2 https://ubuntu.com/security/notices/USN-4236-3 https://usn.ubuntu.com/4236-1/ https://usn.ubuntu.com/4236-2/ https://usn.ubuntu.com/4236-3/
|
libgcrypt20 |
CVE-2021-40528 |
MEDIUM |
1.8.4-5 |
1.8.4-5+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528 https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13 https://eprint.iacr.org/2021/923 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320 https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2
|
libgcrypt20 |
CVE-2018-6829 |
LOW |
1.8.4-5 |
|
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html https://www.oracle.com/security-alerts/cpujan2020.html
|
libgd3 |
CVE-2017-6363 |
HIGH |
2.2.5-5.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363 https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397 https://github.com/libgd/libgd/issues/383 https://ubuntu.com/security/notices/USN-5068-1
|
libgd3 |
CVE-2021-40145 |
HIGH |
2.2.5-5.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145 https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af https://github.com/libgd/libgd/issues/700 https://github.com/libgd/libgd/pull/713 https://ubuntu.com/security/notices/USN-5068-1
|
libgd3 |
CVE-2021-38115 |
MEDIUM |
2.2.5-5.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115 https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032 https://github.com/libgd/libgd/issues/697 https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032 https://ubuntu.com/security/notices/USN-5068-1
|
libgd3 |
CVE-2021-40812 |
MEDIUM |
2.2.5-5.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812 https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9 https://github.com/libgd/libgd/issues/750#issuecomment-914872385 https://github.com/libgd/libgd/issues/757
|
libgd3 |
CVE-2018-14553 |
LOW |
2.2.5-5.2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html https://bugzilla.redhat.com/show_bug.cgi?id=1599032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553 https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f https://github.com/libgd/libgd/pull/580 https://linux.oracle.com/cve/CVE-2018-14553.html https://linux.oracle.com/errata/ELSA-2020-4659.html https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/ https://ubuntu.com/security/notices/USN-4316-1 https://ubuntu.com/security/notices/USN-4316-2 https://usn.ubuntu.com/4316-1/ https://usn.ubuntu.com/4316-2/
|
libgmp10 |
CVE-2021-43618 |
HIGH |
2:6.1.2+dfsg-4 |
|
Expand...https://bugs.debian.org/994405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
libgnutls-dane0 |
CVE-2011-3389 |
LOW |
3.6.7-4+deb10u7 |
|
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/ http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx http://curl.haxx.se/docs/adv_20120124B.html http://downloads.asterisk.org/pub/security/AST-2016-001.html http://ekoparty.org/2011/juliano-rizzo.php http://eprint.iacr.org/2004/111 http://eprint.iacr.org/2006/136 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=132872385320240&w=2 http://marc.info/?l=bugtraq&m=133365109612558&w=2 http://marc.info/?l=bugtraq&m=133728004526190&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue http://osvdb.org/74829 http://rhn.redhat.com/errata/RHSA-2012-0508.html http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/45791 http://secunia.com/advisories/47998 http://secunia.com/advisories/48256 http://secunia.com/advisories/48692 http://secunia.com/advisories/48915 http://secunia.com/advisories/48948 http://secunia.com/advisories/49198 http://secunia.com/advisories/55322 http://secunia.com/advisories/55350 http://secunia.com/advisories/55351 http://security.gentoo.org/glsa/glsa-201203-02.xml http://security.gentoo.org/glsa/glsa-201406-32.xml http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5001 http://support.apple.com/kb/HT5130 http://support.apple.com/kb/HT5281 http://support.apple.com/kb/HT5501 http://support.apple.com/kb/HT6150 http://technet.microsoft.com/security/advisory/2588513 http://vnhacker.blogspot.com/2011/09/beast.html http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf http://www.debian.org/security/2012/dsa-2398 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.imperialviolet.org/2011/09/23/chromeandbeast.html http://www.insecure.cl/Beast-SSL.rar http://www.kb.cert.org/vuls/id/864643 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 http://www.opera.com/docs/changelogs/mac/1151/ http://www.opera.com/docs/changelogs/mac/1160/ http://www.opera.com/docs/changelogs/unix/1151/ http://www.opera.com/docs/changelogs/unix/1160/ http://www.opera.com/docs/changelogs/windows/1151/ http://www.opera.com/docs/changelogs/windows/1160/ http://www.opera.com/support/kb/view/1004/ http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://www.redhat.com/support/errata/RHSA-2011-1384.html http://www.redhat.com/support/errata/RHSA-2012-0006.html http://www.securityfocus.com/bid/49388 http://www.securityfocus.com/bid/49778 http://www.securitytracker.com/id/1029190 http://www.securitytracker.com/id?1025997 http://www.securitytracker.com/id?1026103 http://www.securitytracker.com/id?1026704 http://www.ubuntu.com/usn/USN-1263-1 http://www.us-cert.gov/cas/techalerts/TA12-010A.html https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail https://bugzilla.novell.com/show_bug.cgi?id=719047 https://bugzilla.redhat.com/show_bug.cgi?id=737506 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 https://hermes.opensuse.org/messages/13154861 https://hermes.opensuse.org/messages/13155432 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://linux.oracle.com/cve/CVE-2011-3389.html https://linux.oracle.com/errata/ELSA-2011-1380.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 https://ubuntu.com/security/notices/USN-1263-1
|
libgnutls30 |
CVE-2011-3389 |
LOW |
3.6.7-4+deb10u7 |
|
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/ http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx http://curl.haxx.se/docs/adv_20120124B.html http://downloads.asterisk.org/pub/security/AST-2016-001.html http://ekoparty.org/2011/juliano-rizzo.php http://eprint.iacr.org/2004/111 http://eprint.iacr.org/2006/136 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=132872385320240&w=2 http://marc.info/?l=bugtraq&m=133365109612558&w=2 http://marc.info/?l=bugtraq&m=133728004526190&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue http://osvdb.org/74829 http://rhn.redhat.com/errata/RHSA-2012-0508.html http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/45791 http://secunia.com/advisories/47998 http://secunia.com/advisories/48256 http://secunia.com/advisories/48692 http://secunia.com/advisories/48915 http://secunia.com/advisories/48948 http://secunia.com/advisories/49198 http://secunia.com/advisories/55322 http://secunia.com/advisories/55350 http://secunia.com/advisories/55351 http://security.gentoo.org/glsa/glsa-201203-02.xml http://security.gentoo.org/glsa/glsa-201406-32.xml http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5001 http://support.apple.com/kb/HT5130 http://support.apple.com/kb/HT5281 http://support.apple.com/kb/HT5501 http://support.apple.com/kb/HT6150 http://technet.microsoft.com/security/advisory/2588513 http://vnhacker.blogspot.com/2011/09/beast.html http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf http://www.debian.org/security/2012/dsa-2398 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.imperialviolet.org/2011/09/23/chromeandbeast.html http://www.insecure.cl/Beast-SSL.rar http://www.kb.cert.org/vuls/id/864643 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 http://www.opera.com/docs/changelogs/mac/1151/ http://www.opera.com/docs/changelogs/mac/1160/ http://www.opera.com/docs/changelogs/unix/1151/ http://www.opera.com/docs/changelogs/unix/1160/ http://www.opera.com/docs/changelogs/windows/1151/ http://www.opera.com/docs/changelogs/windows/1160/ http://www.opera.com/support/kb/view/1004/ http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://www.redhat.com/support/errata/RHSA-2011-1384.html http://www.redhat.com/support/errata/RHSA-2012-0006.html http://www.securityfocus.com/bid/49388 http://www.securityfocus.com/bid/49778 http://www.securitytracker.com/id/1029190 http://www.securitytracker.com/id?1025997 http://www.securitytracker.com/id?1026103 http://www.securitytracker.com/id?1026704 http://www.ubuntu.com/usn/USN-1263-1 http://www.us-cert.gov/cas/techalerts/TA12-010A.html https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail https://bugzilla.novell.com/show_bug.cgi?id=719047 https://bugzilla.redhat.com/show_bug.cgi?id=737506 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 https://hermes.opensuse.org/messages/13154861 https://hermes.opensuse.org/messages/13155432 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://linux.oracle.com/cve/CVE-2011-3389.html https://linux.oracle.com/errata/ELSA-2011-1380.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 https://ubuntu.com/security/notices/USN-1263-1
|
libgssapi-krb5-2 |
CVE-2021-37750 |
MEDIUM |
1.17-3+deb10u2 |
1.17-3+deb10u3 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libgssapi-krb5-2 |
CVE-2004-0971 |
LOW |
1.17-3+deb10u2 |
|
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libgssapi-krb5-2 |
CVE-2018-5709 |
LOW |
1.17-3+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libhogweed4 |
CVE-2021-20305 |
HIGH |
3.4.1-1 |
3.4.1-1+deb10u1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1942533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305 https://linux.oracle.com/cve/CVE-2021-20305.html https://linux.oracle.com/errata/ELSA-2021-1206.html https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/ https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html https://security.gentoo.org/glsa/202105-31 https://security.netapp.com/advisory/ntap-20211022-0002/ https://ubuntu.com/security/notices/USN-4906-1 https://www.debian.org/security/2021/dsa-4933
|
libhogweed4 |
CVE-2021-3580 |
HIGH |
3.4.1-1 |
3.4.1-1+deb10u1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1967983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580 https://linux.oracle.com/cve/CVE-2021-3580.html https://linux.oracle.com/errata/ELSA-2021-4451.html https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html https://security.netapp.com/advisory/ntap-20211104-0006/ https://ubuntu.com/security/notices/USN-4990-1
|
libicu63 |
CVE-2020-21913 |
MEDIUM |
63.1-6+deb10u1 |
63.1-6+deb10u2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913 https://github.com/unicode-org/icu/pull/886 https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html https://ubuntu.com/security/notices/USN-5133-1 https://unicode-org.atlassian.net/browse/ICU-20850 https://www.debian.org/security/2021/dsa-5014
|
libidn2-0 |
CVE-2019-12290 |
HIGH |
2.0.5-1+deb10u1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290 https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5 https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de https://gitlab.com/libidn/libidn2/merge_requests/71 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/ https://security.gentoo.org/glsa/202003-63 https://ubuntu.com/security/notices/USN-4168-1 https://usn.ubuntu.com/4168-1/
|
libjbig0 |
CVE-2017-9937 |
LOW |
2.1-3.1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjpeg62-turbo |
CVE-2017-15232 |
LOW |
1:1.5.2-2+deb10u1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232 https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182 https://github.com/mozilla/mozjpeg/issues/268 https://ubuntu.com/security/notices/USN-3706-1 https://usn.ubuntu.com/3706-1/
|
libjpeg62-turbo |
CVE-2018-11813 |
LOW |
1:1.5.2-2+deb10u1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html http://www.ijg.org/files/jpegsrc.v9d.tar.gz https://access.redhat.com/errata/RHSA-2019:2052 https://bugs.gentoo.org/727908 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813 https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c https://linux.oracle.com/cve/CVE-2018-11813.html https://linux.oracle.com/errata/ELSA-2019-2052.html
|
libjpeg62-turbo |
CVE-2020-17541 |
LOW |
1:1.5.2-2+deb10u1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html
|
libk5crypto3 |
CVE-2021-37750 |
MEDIUM |
1.17-3+deb10u2 |
1.17-3+deb10u3 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libk5crypto3 |
CVE-2004-0971 |
LOW |
1.17-3+deb10u2 |
|
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libk5crypto3 |
CVE-2018-5709 |
LOW |
1.17-3+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5-3 |
CVE-2021-37750 |
MEDIUM |
1.17-3+deb10u2 |
1.17-3+deb10u3 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libkrb5-3 |
CVE-2004-0971 |
LOW |
1.17-3+deb10u2 |
|
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libkrb5-3 |
CVE-2018-5709 |
LOW |
1.17-3+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5support0 |
CVE-2021-37750 |
MEDIUM |
1.17-3+deb10u2 |
1.17-3+deb10u3 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libkrb5support0 |
CVE-2004-0971 |
LOW |
1.17-3+deb10u2 |
|
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml http://www.redhat.com/support/errata/RHSA-2005-012.html http://www.securityfocus.com/bid/11289 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
|
libkrb5support0 |
CVE-2018-5709 |
LOW |
1.17-3+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libldap-2.4-2 |
CVE-2015-3276 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securitytracker.com/id/1034221 https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://linux.oracle.com/cve/CVE-2015-3276.html https://linux.oracle.com/errata/ELSA-2015-2131.html
|
libldap-2.4-2 |
CVE-2017-14159 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://www.openldap.org/its/index.cgi?findid=8703
|
libldap-2.4-2 |
CVE-2017-17740 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://www.openldap.org/its/index.cgi/Incoming?id=8759 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
libldap-2.4-2 |
CVE-2020-15719 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html https://access.redhat.com/errata/RHBA-2019:3674 https://bugs.openldap.org/show_bug.cgi?id=9266 https://bugzilla.redhat.com/show_bug.cgi?id=1740070 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
libldap-common |
CVE-2015-3276 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securitytracker.com/id/1034221 https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://linux.oracle.com/cve/CVE-2015-3276.html https://linux.oracle.com/errata/ELSA-2015-2131.html
|
libldap-common |
CVE-2017-14159 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://www.openldap.org/its/index.cgi?findid=8703
|
libldap-common |
CVE-2017-17740 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://www.openldap.org/its/index.cgi/Incoming?id=8759 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
libldap-common |
CVE-2020-15719 |
LOW |
2.4.47+dfsg-3+deb10u6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html https://access.redhat.com/errata/RHBA-2019:3674 https://bugs.openldap.org/show_bug.cgi?id=9266 https://bugzilla.redhat.com/show_bug.cgi?id=1740070 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
liblz4-1 |
CVE-2021-3520 |
CRITICAL |
1.8.3-1 |
1.8.3-1+deb10u1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1954559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520 https://github.com/lz4/lz4/pull/972 https://linux.oracle.com/cve/CVE-2021-3520.html https://linux.oracle.com/errata/ELSA-2021-2575.html https://security.netapp.com/advisory/ntap-20211104-0005/ https://ubuntu.com/security/notices/USN-4968-1 https://ubuntu.com/security/notices/USN-4968-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
liblz4-1 |
CVE-2019-17543 |
LOW |
1.8.3-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941 https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2 https://github.com/lz4/lz4/issues/801 https://github.com/lz4/lz4/pull/756 https://github.com/lz4/lz4/pull/760 https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
libmount1 |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libncurses6 |
CVE-2021-39537 |
LOW |
6.1+20181013-2+deb10u2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
libncursesw6 |
CVE-2021-39537 |
LOW |
6.1+20181013-2+deb10u2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
libnettle6 |
CVE-2021-20305 |
HIGH |
3.4.1-1 |
3.4.1-1+deb10u1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1942533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305 https://linux.oracle.com/cve/CVE-2021-20305.html https://linux.oracle.com/errata/ELSA-2021-1206.html https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/ https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html https://security.gentoo.org/glsa/202105-31 https://security.netapp.com/advisory/ntap-20211022-0002/ https://ubuntu.com/security/notices/USN-4906-1 https://www.debian.org/security/2021/dsa-4933
|
libnettle6 |
CVE-2021-3580 |
HIGH |
3.4.1-1 |
3.4.1-1+deb10u1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1967983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580 https://linux.oracle.com/cve/CVE-2021-3580.html https://linux.oracle.com/errata/ELSA-2021-4451.html https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html https://security.netapp.com/advisory/ntap-20211104-0006/ https://ubuntu.com/security/notices/USN-4990-1
|
libnginx-mod-http-auth-pam |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-auth-pam |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-auth-pam |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-auth-pam |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-dav-ext |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-dav-ext |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-dav-ext |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-dav-ext |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-echo |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-echo |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-echo |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-echo |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-geoip |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-geoip |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-geoip |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-geoip |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-image-filter |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-image-filter |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-image-filter |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-image-filter |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-subs-filter |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-subs-filter |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-subs-filter |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-subs-filter |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-upstream-fair |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-upstream-fair |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-upstream-fair |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-upstream-fair |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-http-xslt-filter |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-http-xslt-filter |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-http-xslt-filter |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-http-xslt-filter |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-mail |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-mail |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-mail |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-mail |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libnginx-mod-stream |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
libnginx-mod-stream |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
libnginx-mod-stream |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
libnginx-mod-stream |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
libp11-kit0 |
CVE-2020-29361 |
HIGH |
0.23.15-2 |
0.23.15-2+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361 https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2 https://linux.oracle.com/cve/CVE-2020-29361.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://ubuntu.com/security/notices/USN-4677-1 https://ubuntu.com/security/notices/USN-4677-2 https://www.debian.org/security/2021/dsa-4822
|
libp11-kit0 |
CVE-2020-29363 |
HIGH |
0.23.15-2 |
0.23.15-2+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363 https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x https://linux.oracle.com/cve/CVE-2020-29363.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://ubuntu.com/security/notices/USN-4677-1 https://www.debian.org/security/2021/dsa-4822
|
libp11-kit0 |
CVE-2020-29362 |
MEDIUM |
0.23.15-2 |
0.23.15-2+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362 https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc https://linux.oracle.com/cve/CVE-2020-29362.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://ubuntu.com/security/notices/USN-4677-1 https://www.debian.org/security/2021/dsa-4822
|
libpcre3 |
CVE-2020-14155 |
MEDIUM |
2:8.39-12 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3 |
CVE-2017-11164 |
LOW |
2:8.39-12 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3 |
CVE-2017-16231 |
LOW |
2:8.39-12 |
|
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html http://seclists.org/fulldisclosure/2018/Dec/33 http://www.openwall.com/lists/oss-security/2017/11/01/11 http://www.openwall.com/lists/oss-security/2017/11/01/3 http://www.openwall.com/lists/oss-security/2017/11/01/7 http://www.openwall.com/lists/oss-security/2017/11/01/8 http://www.securityfocus.com/bid/101688 https://bugs.exim.org/show_bug.cgi?id=2047
|
libpcre3 |
CVE-2017-7245 |
LOW |
2:8.39-12 |
|
Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
libpcre3 |
CVE-2017-7246 |
LOW |
2:8.39-12 |
|
Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
libpcre3 |
CVE-2019-20838 |
LOW |
2:8.39-12 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpng16-16 |
CVE-2021-4214 |
MEDIUM |
1.6.36-6 |
|
Expand... |
libpng16-16 |
CVE-2018-14048 |
LOW |
1.6.36-6 |
|
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048 https://github.com/fouzhe/security/tree/master/libpng https://github.com/glennrp/libpng/issues/238 https://seclists.org/bugtraq/2019/Apr/30 https://security.gentoo.org/glsa/201908-02
|
libpng16-16 |
CVE-2018-14550 |
LOW |
1.6.36-6 |
|
Expand...https://github.com/advisories/GHSA-qwwr-qc2p-6283 https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token https://github.com/glennrp/libpng/issues/246 https://nvd.nist.gov/vuln/detail/CVE-2018-14550 https://security.gentoo.org/glsa/201908-02 https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612 https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpng16-16 |
CVE-2019-6129 |
LOW |
1.6.36-6 |
|
Expand...https://github.com/glennrp/libpng/issues/269 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
libpq5 |
CVE-2021-23214 |
HIGH |
11.12-0+deb10u1 |
11.14-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214 https://linux.oracle.com/cve/CVE-2021-23214.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
|
libpq5 |
CVE-2021-3677 |
MEDIUM |
11.12-0+deb10u1 |
11.13-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677 https://linux.oracle.com/cve/CVE-2021-3677.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://ubuntu.com/security/notices/USN-5038-1 https://www.postgresql.org/support/security/CVE-2021-3677/
|
libpq5 |
CVE-2019-9193 |
LOW |
11.12-0+deb10u1 |
|
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ https://security.netapp.com/advisory/ntap-20190502-0003/ https://www.postgresql.org/about/news/1935/ https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
|
libpq5 |
CVE-2021-23222 |
LOW |
11.12-0+deb10u1 |
11.14-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
|
libseccomp2 |
CVE-2019-9893 |
LOW |
2.3.3-4 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html https://access.redhat.com/errata/RHSA-2019:3624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893 https://github.com/seccomp/libseccomp/issues/139 https://linux.oracle.com/cve/CVE-2019-9893.html https://linux.oracle.com/errata/ELSA-2019-3624.html https://seclists.org/oss-sec/2019/q1/179 https://security.gentoo.org/glsa/201904-18 https://ubuntu.com/security/notices/USN-4001-1 https://ubuntu.com/security/notices/USN-4001-2 https://usn.ubuntu.com/4001-1/ https://usn.ubuntu.com/4001-2/ https://www.openwall.com/lists/oss-security/2019/03/15/1
|
libsepol1 |
CVE-2021-36084 |
LOW |
2.8-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36085 |
LOW |
2.8-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36086 |
LOW |
2.8-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36087 |
LOW |
2.8-1 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
|
libsmartcols1 |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libssl1.1 |
CVE-2021-3711 |
CRITICAL |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://security.netapp.com/advisory/ntap-20210827-0010/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5051-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
libssl1.1 |
CVE-2021-3712 |
HIGH |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
libssl1.1 |
CVE-2021-4160 |
MEDIUM |
1.1.1d-0+deb10u6 |
|
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb https://www.openssl.org/news/secadv/20220128.txt
|
libssl1.1 |
CVE-2007-6755 |
LOW |
1.1.1d-0+deb10u6 |
|
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/ http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html http://rump2007.cr.yp.to/15-shumow.pdf http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect http://www.securityfocus.com/bid/63657 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
|
libssl1.1 |
CVE-2010-0928 |
LOW |
1.1.1d-0+deb10u6 |
|
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/ http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf http://www.networkworld.com/news/2010/030410-rsa-security-attack.html http://www.osvdb.org/62808 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/ https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
|
libstdc++6 |
CVE-2018-12886 |
HIGH |
8.3.0-6 |
|
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup https://www.gnu.org/software/gcc/gcc-8/changes.html
|
libstdc++6 |
CVE-2019-15847 |
HIGH |
8.3.0-6 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 https://linux.oracle.com/cve/CVE-2019-15847.html https://linux.oracle.com/errata/ELSA-2020-1864.html
|
libsystemd0 |
CVE-2019-3843 |
HIGH |
241-7~deb10u4 |
|
Expand...http://www.securityfocus.com/bid/108116 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843 https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable) https://linux.oracle.com/cve/CVE-2019-3843.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/ https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libsystemd0 |
CVE-2019-3844 |
HIGH |
241-7~deb10u4 |
|
Expand...http://www.securityfocus.com/bid/108096 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844 https://linux.oracle.com/cve/CVE-2019-3844.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libsystemd0 |
CVE-2021-33910 |
MEDIUM |
241-7~deb10u4 |
241-7~deb10u8 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
libsystemd0 |
CVE-2021-3997 |
MEDIUM |
241-7~deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libsystemd0 |
CVE-2013-4392 |
LOW |
241-7~deb10u4 |
|
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
libsystemd0 |
CVE-2019-20386 |
LOW |
241-7~deb10u4 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad https://linux.oracle.com/cve/CVE-2019-20386.html https://linux.oracle.com/errata/ELSA-2020-4553.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/ https://security.netapp.com/advisory/ntap-20200210-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libsystemd0 |
CVE-2020-13529 |
LOW |
241-7~deb10u4 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libsystemd0 |
CVE-2020-13776 |
LOW |
241-7~deb10u4 |
|
Expand...https://github.com/systemd/systemd/issues/15985 https://linux.oracle.com/cve/CVE-2020-13776.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/ https://security.netapp.com/advisory/ntap-20200611-0003/
|
libtasn1-6 |
CVE-2018-1000654 |
LOW |
4.13-3 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html http://www.securityfocus.com/bid/105151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654 https://gitlab.com/gnutls/libtasn1/issues/4 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2020-19143 |
MEDIUM |
4.1.0+git191117-2~deb10u2 |
4.1.0+git191117-2~deb10u3 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143 https://gitlab.com/libtiff/libtiff/-/issues/158 https://gitlab.com/libtiff/libtiff/-/merge_requests/119 https://security.netapp.com/advisory/ntap-20211004-0005/ https://ubuntu.com/security/notices/USN-5084-1 https://www.debian.org/security/2021/dsa-4997
|
libtiff5 |
CVE-2022-22844 |
MEDIUM |
4.1.0+git191117-2~deb10u2 |
|
Expand...https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287
|
libtiff5 |
CVE-2014-8130 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483 http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html http://openwall.com/lists/oss-security/2015/01/24/15 http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://support.apple.com/kb/HT204941 http://support.apple.com/kb/HT204942 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt http://www.securityfocus.com/bid/72353 http://www.securitytracker.com/id/1032760 https://bugzilla.redhat.com/show_bug.cgi?id=1185817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543 https://linux.oracle.com/cve/CVE-2014-8130.html https://linux.oracle.com/errata/ELSA-2016-1547.html https://security.gentoo.org/glsa/201701-16 https://ubuntu.com/security/notices/USN-2553-1
|
libtiff5 |
CVE-2017-16232 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html http://seclists.org/fulldisclosure/2018/Dec/32 http://seclists.org/fulldisclosure/2018/Dec/47 http://www.openwall.com/lists/oss-security/2017/11/01/11 http://www.openwall.com/lists/oss-security/2017/11/01/3 http://www.openwall.com/lists/oss-security/2017/11/01/7 http://www.openwall.com/lists/oss-security/2017/11/01/8 http://www.securityfocus.com/bid/101696
|
libtiff5 |
CVE-2017-17973 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769 http://www.securityfocus.com/bid/102331 https://bugzilla.novell.com/show_bug.cgi?id=1074318 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
|
libtiff5 |
CVE-2017-5563 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664 http://www.securityfocus.com/bid/95705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563 https://security.gentoo.org/glsa/201709-27 https://ubuntu.com/security/notices/USN-3606-1 https://usn.ubuntu.com/3606-1/
|
libtiff5 |
CVE-2017-9117 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690 http://www.securityfocus.com/bid/98581 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117 https://ubuntu.com/security/notices/USN-3606-1 https://usn.ubuntu.com/3606-1/
|
libtiff5 |
CVE-2018-10126 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2020-35521 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034 https://linux.oracle.com/cve/CVE-2020-35521.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtiff5 |
CVE-2020-35522 |
LOW |
4.1.0+git191117-2~deb10u2 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtinfo6 |
CVE-2021-39537 |
LOW |
6.1+20181013-2+deb10u2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
libudev1 |
CVE-2019-3843 |
HIGH |
241-7~deb10u4 |
|
Expand...http://www.securityfocus.com/bid/108116 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843 https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable) https://linux.oracle.com/cve/CVE-2019-3843.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/ https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libudev1 |
CVE-2019-3844 |
HIGH |
241-7~deb10u4 |
|
Expand...http://www.securityfocus.com/bid/108096 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844 https://linux.oracle.com/cve/CVE-2019-3844.html https://linux.oracle.com/errata/ELSA-2020-1794.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190619-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libudev1 |
CVE-2021-33910 |
MEDIUM |
241-7~deb10u4 |
241-7~deb10u8 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
libudev1 |
CVE-2021-3997 |
MEDIUM |
241-7~deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libudev1 |
CVE-2013-4392 |
LOW |
241-7~deb10u4 |
|
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
libudev1 |
CVE-2019-20386 |
LOW |
241-7~deb10u4 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad https://linux.oracle.com/cve/CVE-2019-20386.html https://linux.oracle.com/errata/ELSA-2020-4553.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/ https://security.netapp.com/advisory/ntap-20200210-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
libudev1 |
CVE-2020-13529 |
LOW |
241-7~deb10u4 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libudev1 |
CVE-2020-13776 |
LOW |
241-7~deb10u4 |
|
Expand...https://github.com/systemd/systemd/issues/15985 https://linux.oracle.com/cve/CVE-2020-13776.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/ https://security.netapp.com/advisory/ntap-20200611-0003/
|
libunbound8 |
CVE-2020-28935 |
MEDIUM |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28935 https://linux.oracle.com/cve/CVE-2020-28935.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html https://security.gentoo.org/glsa/202101-38 https://ubuntu.com/security/notices/USN-4938-1 https://www.nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt https://www.nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt
|
libunbound8 |
CVE-2019-18934 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html http://www.openwall.com/lists/oss-security/2019/11/19/1 https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog https://linux.oracle.com/cve/CVE-2019-18934.html https://linux.oracle.com/errata/ELSA-2020-1716.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCR6JP7MSRARTOGEHGST64G4FJGX5VK/ https://nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
|
libunbound8 |
CVE-2019-25031 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25031 https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25032 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25032 https://linux.oracle.com/cve/CVE-2019-25032.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25033 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25033 https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25034 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25034 https://linux.oracle.com/cve/CVE-2019-25034.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25035 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25035 https://linux.oracle.com/cve/CVE-2019-25035.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25036 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25036 https://linux.oracle.com/cve/CVE-2019-25036.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25037 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25037 https://linux.oracle.com/cve/CVE-2019-25037.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25038 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25038 https://linux.oracle.com/cve/CVE-2019-25038.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25039 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25039 https://linux.oracle.com/cve/CVE-2019-25039.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25040 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25040 https://linux.oracle.com/cve/CVE-2019-25040.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25041 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25041 https://linux.oracle.com/cve/CVE-2019-25041.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libunbound8 |
CVE-2019-25042 |
LOW |
1.9.0-2+deb10u2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25042 https://linux.oracle.com/cve/CVE-2019-25042.html https://linux.oracle.com/errata/ELSA-2021-1853.html https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ https://security.netapp.com/advisory/ntap-20210507-0007/ https://ubuntu.com/security/notices/USN-4938-1
|
libuuid1 |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
libwebp6 |
CVE-2016-9085 |
LOW |
0.6.1-2+deb10u1 |
|
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3 http://www.securityfocus.com/bid/93928 https://bugzilla.redhat.com/show_bug.cgi?id=1389338 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/ https://security.gentoo.org/glsa/201701-61
|
libxml2 |
CVE-2017-16932 |
HIGH |
2.9.4+dfsg1-7+deb10u2 |
|
Expand...http://xmlsoft.org/news.html https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html https://bugzilla.gnome.org/show_bug.cgi?id=759579 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932 https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961 https://github.com/sparklemotion/nokogiri/issues/1714 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html https://ubuntu.com/security/notices/USN-3504-1 https://ubuntu.com/security/notices/USN-3504-2 https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/usn/usn-3504-1/
|
libxml2 |
CVE-2016-9318 |
MEDIUM |
2.9.4+dfsg1-7+deb10u2 |
|
Expand...http://www.securityfocus.com/bid/94347 https://bugzilla.gnome.org/show_bug.cgi?id=772726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 https://github.com/lsh123/xmlsec/issues/43 https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
libxslt1.1 |
CVE-2015-9019 |
LOW |
1.1.32-2.2~deb10u1 |
|
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400 https://bugzilla.suse.com/show_bug.cgi?id=934119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
|
libzstd1 |
CVE-2021-24031 |
MEDIUM |
1.3.8+dfsg-3 |
1.3.8+dfsg-3+deb10u1 |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24031 https://github.com/facebook/zstd/issues/1630 https://ubuntu.com/security/notices/USN-4760-1 https://www.facebook.com/security/advisories/cve-2021-24031
|
libzstd1 |
CVE-2021-24032 |
MEDIUM |
1.3.8+dfsg-3 |
1.3.8+dfsg-3+deb10u2 |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24032 https://github.com/facebook/zstd/issues/2491 https://ubuntu.com/security/notices/USN-4760-1 https://www.facebook.com/security/advisories/cve-2021-24032
|
locales |
CVE-2021-33574 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
locales |
CVE-2021-35942 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions
|
locales |
CVE-2022-23218 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
|
locales |
CVE-2022-23219 |
CRITICAL |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
|
locales |
CVE-2020-1751 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751 https://linux.oracle.com/cve/CVE-2020-1751.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200430-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25423 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
locales |
CVE-2020-1752 |
HIGH |
2.28-10 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
locales |
CVE-2021-3326 |
HIGH |
2.28-10 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
|
locales |
CVE-2021-3999 |
HIGH |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
locales |
CVE-2019-25013 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
|
locales |
CVE-2020-10029 |
MEDIUM |
2.28-10 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
locales |
CVE-2020-27618 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
locales |
CVE-2021-3998 |
MEDIUM |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
locales |
CVE-2010-4756 |
LOW |
2.28-10 |
|
Expand...http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
|
locales |
CVE-2016-10228 |
LOW |
2.28-10 |
|
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
locales |
CVE-2018-20796 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/107160 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
locales |
CVE-2019-1010022 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022
|
locales |
CVE-2019-1010023 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109167 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023
|
locales |
CVE-2019-1010024 |
LOW |
2.28-10 |
|
Expand...http://www.securityfocus.com/bid/109162 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024
|
locales |
CVE-2019-1010025 |
LOW |
2.28-10 |
|
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025
|
locales |
CVE-2019-19126 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
locales |
CVE-2019-9192 |
LOW |
2.28-10 |
|
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
locales |
CVE-2020-6096 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
locales |
CVE-2021-27645 |
LOW |
2.28-10 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462
|
login |
CVE-2007-5686 |
LOW |
1:4.5-1.1 |
|
Expand...http://secunia.com/advisories/27215 http://www.securityfocus.com/archive/1/482129/100/100/threaded http://www.securityfocus.com/archive/1/482857/100/0/threaded http://www.securityfocus.com/bid/26048 http://www.vupen.com/english/advisories/2007/3474 https://issues.rpath.com/browse/RPL-1825
|
login |
CVE-2013-4235 |
LOW |
1:4.5-1.1 |
|
Expand...https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
login |
CVE-2018-7169 |
LOW |
1:4.5-1.1 |
|
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 https://github.com/shadow-maint/shadow/pull/97 https://security.gentoo.org/glsa/201805-09 https://ubuntu.com/security/notices/USN-5254-1
|
login |
CVE-2019-19882 |
LOW |
1:4.5-1.1 |
|
Expand...https://bugs.archlinux.org/task/64836 https://bugs.gentoo.org/702252 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75 https://github.com/shadow-maint/shadow/pull/199 https://github.com/void-linux/void-packages/pull/17580 https://security.gentoo.org/glsa/202008-09
|
mount |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|
ncurses-base |
CVE-2021-39537 |
LOW |
6.1+20181013-2+deb10u2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
ncurses-bin |
CVE-2021-39537 |
LOW |
6.1+20181013-2+deb10u2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
nginx |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
nginx |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
nginx |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
nginx |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
nginx-common |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
nginx-common |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
nginx-common |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
nginx-common |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
nginx-full |
CVE-2021-3618 |
HIGH |
1.14.2-2+deb10u4 |
|
Expand...https://alpaca-attack.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618 https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html https://marc.info/?l=sendmail-announce&m=159394546814125&w=2 https://security.appspot.com/vsftpd/Changelog.txt
|
nginx-full |
CVE-2020-36309 |
MEDIUM |
1.14.2-2+deb10u4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309 https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 https://github.com/openresty/lua-nginx-module/pull/1654 https://news.ycombinator.com/item?id=26712562 https://security.netapp.com/advisory/ntap-20210507-0005/
|
nginx-full |
CVE-2009-4487 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37711 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
|
nginx-full |
CVE-2013-0337 |
LOW |
1.14.2-2+deb10u4 |
|
Expand...http://secunia.com/advisories/55181 http://security.gentoo.org/glsa/glsa-201310-04.xml http://www.openwall.com/lists/oss-security/2013/02/21/15 http://www.openwall.com/lists/oss-security/2013/02/22/1 http://www.openwall.com/lists/oss-security/2013/02/24/1
|
openssl |
CVE-2021-3711 |
CRITICAL |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://security.netapp.com/advisory/ntap-20210827-0010/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5051-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
openssl |
CVE-2021-3712 |
HIGH |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
openssl |
CVE-2021-4160 |
MEDIUM |
1.1.1d-0+deb10u6 |
|
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb https://www.openssl.org/news/secadv/20220128.txt
|
openssl |
CVE-2007-6755 |
LOW |
1.1.1d-0+deb10u6 |
|
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/ http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html http://rump2007.cr.yp.to/15-shumow.pdf http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect http://www.securityfocus.com/bid/63657 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
|
openssl |
CVE-2010-0928 |
LOW |
1.1.1d-0+deb10u6 |
|
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/ http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf http://www.networkworld.com/news/2010/030410-rsa-security-attack.html http://www.osvdb.org/62808 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/ https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
|
passwd |
CVE-2007-5686 |
LOW |
1:4.5-1.1 |
|
Expand...http://secunia.com/advisories/27215 http://www.securityfocus.com/archive/1/482129/100/100/threaded http://www.securityfocus.com/archive/1/482857/100/0/threaded http://www.securityfocus.com/bid/26048 http://www.vupen.com/english/advisories/2007/3474 https://issues.rpath.com/browse/RPL-1825
|
passwd |
CVE-2013-4235 |
LOW |
1:4.5-1.1 |
|
Expand...https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
passwd |
CVE-2018-7169 |
LOW |
1:4.5-1.1 |
|
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 https://github.com/shadow-maint/shadow/pull/97 https://security.gentoo.org/glsa/201805-09 https://ubuntu.com/security/notices/USN-5254-1
|
passwd |
CVE-2019-19882 |
LOW |
1:4.5-1.1 |
|
Expand...https://bugs.archlinux.org/task/64836 https://bugs.gentoo.org/702252 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75 https://github.com/shadow-maint/shadow/pull/199 https://github.com/void-linux/void-packages/pull/17580 https://security.gentoo.org/glsa/202008-09
|
perl-base |
CVE-2020-10543 |
HIGH |
5.28.1-6 |
5.28.1-6+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed https://linux.oracle.com/cve/CVE-2020-10543.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
perl-base |
CVE-2020-10878 |
HIGH |
5.28.1-6 |
5.28.1-6+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c https://linux.oracle.com/cve/CVE-2020-10878.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
perl-base |
CVE-2020-12723 |
HIGH |
5.28.1-6 |
5.28.1-6+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/Perl/perl5/issues/16947 https://github.com/Perl/perl5/issues/17743 https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a https://linux.oracle.com/cve/CVE-2020-12723.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
perl-base |
CVE-2020-16156 |
HIGH |
5.28.1-6 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-base |
CVE-2011-4116 |
LOW |
5.28.1-6 |
|
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2 http://www.openwall.com/lists/oss-security/2011/11/04/4 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14 https://rt.cpan.org/Public/Bug/Display.html?id=69106 https://seclists.org/oss-sec/2011/q4/238
|
postgresql-11 |
CVE-2021-23214 |
HIGH |
11.12-0+deb10u1 |
11.14-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214 https://linux.oracle.com/cve/CVE-2021-23214.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
|
postgresql-11 |
CVE-2021-3677 |
MEDIUM |
11.12-0+deb10u1 |
11.13-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677 https://linux.oracle.com/cve/CVE-2021-3677.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://ubuntu.com/security/notices/USN-5038-1 https://www.postgresql.org/support/security/CVE-2021-3677/
|
postgresql-11 |
CVE-2019-9193 |
LOW |
11.12-0+deb10u1 |
|
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ https://security.netapp.com/advisory/ntap-20190502-0003/ https://www.postgresql.org/about/news/1935/ https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
|
postgresql-11 |
CVE-2021-23222 |
LOW |
11.12-0+deb10u1 |
11.14-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
|
postgresql-client-11 |
CVE-2021-23214 |
HIGH |
11.12-0+deb10u1 |
11.14-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214 https://linux.oracle.com/cve/CVE-2021-23214.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
|
postgresql-client-11 |
CVE-2021-3677 |
MEDIUM |
11.12-0+deb10u1 |
11.13-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677 https://linux.oracle.com/cve/CVE-2021-3677.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://ubuntu.com/security/notices/USN-5038-1 https://www.postgresql.org/support/security/CVE-2021-3677/
|
postgresql-client-11 |
CVE-2019-9193 |
LOW |
11.12-0+deb10u1 |
|
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ https://security.netapp.com/advisory/ntap-20190502-0003/ https://www.postgresql.org/about/news/1935/ https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
|
postgresql-client-11 |
CVE-2021-23222 |
LOW |
11.12-0+deb10u1 |
11.14-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
|
tar |
CVE-2005-2541 |
LOW |
1.30+dfsg-6 |
|
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
|
tar |
CVE-2019-9923 |
LOW |
1.30+dfsg-6 |
|
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html http://savannah.gnu.org/bugs/?55369 https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://ubuntu.com/security/notices/USN-4692-1
|
tar |
CVE-2021-20193 |
LOW |
1.30+dfsg-6 |
|
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 https://savannah.gnu.org/bugs/?59897 https://security.gentoo.org/glsa/202105-29
|
util-linux |
CVE-2021-37600 |
LOW |
2.33.1-0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://security.netapp.com/advisory/ntap-20210902-0002/
|