2021-12-05 00:50:14 +00:00
---
hide:
- toc
---
2021-12-05 23:17:30 +00:00
# Security Overview
2021-12-04 20:11:45 +00:00
2021-12-05 00:50:14 +00:00
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
2021-12-04 20:11:45 +00:00
## Helm-Chart
##### Scan Results
2021-12-05 00:50:14 +00:00
#### Chart Object: protonmail-bridge/templates/common.yaml
2021-12-04 20:11:45 +00:00
2021-12-04 20:34:35 +00:00
2021-12-05 00:50:14 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-protonmail-bridge' of Deployment ' RELEASE-NAME-protonmail-bridge' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-protonmail-bridge' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-protonmail-bridge' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-protonmail-bridge' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-protonmail-bridge' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-protonmail-bridge' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root primary or supplementary GID. < br > < hr > < br > Deployment ' RELEASE-NAME-protonmail-bridge' should set ' spec.securityContext.runAsGroup' , ' spec.securityContext.supplementalGroups[*]' and ' spec.securityContext.fsGroup' to integer greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv029" > https://avd.aquasec.com/appshield/ksv029< / a > < br > < / details > |
2021-12-04 20:11:45 +00:00
## Containers
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/protonmail-bridge:v1.8.10-1@sha256:58a54002123cc9a83cfb3170deb0a1dbf4cedabdced09a9c6bcafc19ee4b5631
##### Scan Results
2021-12-05 00:50:14 +00:00
#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2)
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
**alpine**
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2021-12-28 15:32:09 +00:00
| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
#### Container: tccr.io/truecharts/protonmail-bridge:v1.8.10-1@sha256:58a54002123cc9a83cfb3170deb0a1dbf4cedabdced09a9c6bcafc19ee4b5631 (ubuntu 18.04)
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
**ubuntu**
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2021-12-05 00:50:14 +00:00
| bash | CVE-2019-18276 | LOW | 4.4.18-2ubuntu1.2 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html" > http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276< / a > < br > < a href = "https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff" > https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-18276.html" > https://linux.oracle.com/cve/CVE-2019-18276.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1679.html" > https://linux.oracle.com/errata/ELSA-2021-1679.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-34" > https://security.gentoo.org/glsa/202105-34< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200430-0003/" > https://security.netapp.com/advisory/ntap-20200430-0003/< / a > < br > < a href = "https://www.youtube.com/watch?v=-wGtxJ8opa8" > https://www.youtube.com/watch?v=-wGtxJ8opa8< / a > < br > < / details > |
| coreutils | CVE-2016-2781 | LOW | 8.28-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < / details > |
| dirmngr | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gcc-8-base | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
| gnupg | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gnupg-l10n | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gnupg-utils | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gnupg2 | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpg | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpg-agent | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpg-wks-client | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpg-wks-server | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpgconf | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpgsm | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| gpgv | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
| libasn1-8-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libc-bin | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < / details > |
| libc-bin | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc" > https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210909-0005/" > https://security.netapp.com/advisory/ntap-20210909-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28213" > https://sourceware.org/bugzilla/show_bug.cgi?id=28213< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641" > https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8" > https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8< / a > < br > < / details > |
| libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| libc-bin | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
| libc-bin | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < / details > |
| libc-bin | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
| libc-bin | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b" > https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b< / a > < br > < / details > |
| libc-bin | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < / details > |
| libc-bin | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
| libc-bin | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < / details > |
| libc-bin | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33574.html" > https://linux.oracle.com/cve/CVE-2021-33574.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210629-0005/" > https://security.netapp.com/advisory/ntap-20210629-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1< / a > < br > < / details > |
| libc6 | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < / details > |
| libc6 | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc" > https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210909-0005/" > https://security.netapp.com/advisory/ntap-20210909-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28213" > https://sourceware.org/bugzilla/show_bug.cgi?id=28213< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641" > https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8" > https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8< / a > < br > < / details > |
| libc6 | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| libc6 | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
| libc6 | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < / details > |
| libc6 | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
| libc6 | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b" > https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b< / a > < br > < / details > |
| libc6 | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < / details > |
| libc6 | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
| libc6 | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < / details > |
| libc6 | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33574.html" > https://linux.oracle.com/cve/CVE-2021-33574.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210629-0005/" > https://security.netapp.com/advisory/ntap-20210629-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1< / a > < br > < / details > |
| libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
2021-12-14 20:47:51 +00:00
| libglib2.0-0 | CVE-2021-3800 | MEDIUM | 2.56.4-0ubuntu0.18.04.8 | 2.56.4-0ubuntu0.18.04.9 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3800" > https://access.redhat.com/security/cve/CVE-2021-3800< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3800.html" > https://linux.oracle.com/cve/CVE-2021-3800.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4385.html" > https://linux.oracle.com/errata/ELSA-2021-4385.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5189-1" > https://ubuntu.com/security/notices/USN-5189-1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2017/06/23/8" > https://www.openwall.com/lists/oss-security/2017/06/23/8< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libgnutls30 | CVE-2018-16868 | LOW | 3.5.18-1ubuntu1.5 | | < details > < summary > Expand...< / summary > < a href = "http://cat.eyalro.net/" > http://cat.eyalro.net/< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html" > http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html" > http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106080" > http://www.securityfocus.com/bid/106080< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868< / a > < br > < / details > |
| libgssapi3-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libhcrypto4-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libheimbase1-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libheimntlm0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libhx509-5-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libkrb5-26-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-9 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-9 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20838.html" > https://linux.oracle.com/cve/CVE-2019-20838.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/" > https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-14155.html" > https://linux.oracle.com/cve/CVE-2020-14155.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
| libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/HT211168" > https://support.apple.com/HT211168< / a > < br > < a href = "https://support.apple.com/HT211170" > https://support.apple.com/HT211170< / a > < br > < a href = "https://support.apple.com/HT211171" > https://support.apple.com/HT211171< / a > < br > < a href = "https://support.apple.com/HT211175" > https://support.apple.com/HT211175< / a > < br > < a href = "https://support.apple.com/HT211178" > https://support.apple.com/HT211178< / a > < br > < a href = "https://support.apple.com/HT211179" > https://support.apple.com/HT211179< / a > < br > < a href = "https://support.apple.com/HT211181" > https://support.apple.com/HT211181< / a > < br > < a href = "https://vuldb.com/?id.155768" > https://vuldb.com/?id.155768< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/en-us/HT211935" > https://support.apple.com/en-us/HT211935< / a > < br > < a href = "https://support.apple.com/en-us/HT211952" > https://support.apple.com/en-us/HT211952< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211847" > https://support.apple.com/en-us/HT211847< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211846" > https://support.apple.com/kb/HT211846< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/< / a > < br > < / details > |
| libstdc++6 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-2 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html< / a > < br > < a href = "http://www.securityfocus.com/bid/105151" > http://www.securityfocus.com/bid/105151< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654< / a > < br > < a href = "https://gitlab.com/gnutls/libtasn1/issues/4" > https://gitlab.com/gnutls/libtasn1/issues/4< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libtinfo5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libtinfo5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libwind0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2021-12-07 22:59:37 +00:00
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| login | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| login | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" > https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/97" > https://github.com/shadow-maint/shadow/pull/97< / a > < br > < a href = "https://security.gentoo.org/glsa/201805-09" > https://security.gentoo.org/glsa/201805-09< / a > < br > < / details > |
| multiarch-support | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < / details > |
| multiarch-support | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc" > https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210909-0005/" > https://security.netapp.com/advisory/ntap-20210909-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28213" > https://sourceware.org/bugzilla/show_bug.cgi?id=28213< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641" > https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8" > https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8< / a > < br > < / details > |
| multiarch-support | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
| multiarch-support | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < / details > |
| multiarch-support | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
| multiarch-support | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b" > https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b< / a > < br > < / details > |
| multiarch-support | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < / details > |
| multiarch-support | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
| multiarch-support | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < / details > |
| multiarch-support | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33574.html" > https://linux.oracle.com/cve/CVE-2021-33574.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210629-0005/" > https://security.netapp.com/advisory/ntap-20210629-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1< / a > < br > < / details > |
| ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| pass | CVE-2018-12356 | MEDIUM | 1.7.1-3 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2018/06/14/3" > http://openwall.com/lists/oss-security/2018/06/14/3< / a > < br > < a href = "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html" > http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/Apr/38" > http://seclists.org/fulldisclosure/2019/Apr/38< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2018/06/14/3" > http://www.openwall.com/lists/oss-security/2018/06/14/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2019/04/30/4" > http://www.openwall.com/lists/oss-security/2019/04/30/4< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12356" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12356< / a > < br > < a href = "https://git.zx2c4.com/password-store/commit/?id=8683403b77f59c56fcb1f05c61ab33b9fd61a30d" > https://git.zx2c4.com/password-store/commit/?id=8683403b77f59c56fcb1f05c61ab33b9fd61a30d< / a > < br > < a href = "https://github.com/RUB-NDS/Johnny-You-Are-Fired" > https://github.com/RUB-NDS/Johnny-You-Are-Fired< / a > < br > < a href = "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf" > https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf< / a > < br > < a href = "https://lists.zx2c4.com/pipermail/password-store/2018-June/003308.html" > https://lists.zx2c4.com/pipermail/password-store/2018-June/003308.html< / a > < br > < a href = "https://neopg.io/blog/pass-signature-spoof/" > https://neopg.io/blog/pass-signature-spoof/< / a > < br > < / details > |
| passwd | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" > https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/97" > https://github.com/shadow-maint/shadow/pull/97< / a > < br > < a href = "https://security.gentoo.org/glsa/201805-09" > https://security.gentoo.org/glsa/201805-09< / a > < br > < / details > |
2021-12-14 20:47:51 +00:00
| perl-base | CVE-2020-16156 | MEDIUM | 5.26.1-6ubuntu0.5 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c" > https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
2021-12-18 20:15:26 +00:00
**gobinary**
2021-12-21 18:46:27 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5-0.20201125200606-c27b9fd57aec | 0.3.7 | < details > < summary > Expand...< / summary > < / details > |
2021-12-18 20:15:26 +00:00
**gobinary**
2021-12-21 18:46:27 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5-0.20201125200606-c27b9fd57aec | 0.3.7 | < details > < summary > Expand...< / summary > < / details > |