2021-12-05 00:50:14 +00:00
---
hide:
- toc
---
2021-12-05 23:17:30 +00:00
# Security Overview
2021-12-04 20:11:45 +00:00
2021-12-05 00:50:14 +00:00
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
2021-12-04 20:11:45 +00:00
## Helm-Chart
##### Scan Results
2021-12-05 00:50:14 +00:00
#### Chart Object: airsonic/templates/common.yaml
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
2021-12-04 20:34:35 +00:00
2021-12-05 00:50:14 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv001" > https://avd.aquasec.com/appshield/ksv001< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-airsonic' of Deployment ' RELEASE-NAME-airsonic' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | < details > < summary > Expand...< / summary > Enforcing CPU limits prevents DoS via resource exhaustion. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' resources.limits.cpu' < / details > | < details > < summary > Expand...< / summary > < a href = "https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits" > https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv011" > https://avd.aquasec.com/appshield/ksv011< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-airsonic' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-airsonic' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | < details > < summary > Expand...< / summary > When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' resources.requests.cpu' < / details > | < details > < summary > Expand...< / summary > < a href = "https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits" > https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv015" > https://avd.aquasec.com/appshield/ksv015< / a > < br > < / details > |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | < details > < summary > Expand...< / summary > When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' resources.requests.memory' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-resources-limits-memory/" > https://kubesec.io/basics/containers-resources-limits-memory/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv016" > https://avd.aquasec.com/appshield/ksv016< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv017" > https://avd.aquasec.com/appshield/ksv017< / a > < br > < / details > |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | < details > < summary > Expand...< / summary > Enforcing memory limits prevents DoS via resource exhaustion. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' resources.limits.memory' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-resources-limits-memory/" > https://kubesec.io/basics/containers-resources-limits-memory/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv018" > https://avd.aquasec.com/appshield/ksv018< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-airsonic' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-airsonic' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-airsonic' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | < details > < summary > Expand...< / summary > HostPath volumes must be forbidden. < br > < hr > < br > Deployment ' RELEASE-NAME-airsonic' should not set ' spec.template.volumes.hostPath' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv023" > https://avd.aquasec.com/appshield/ksv023< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root primary or supplementary GID. < br > < hr > < br > Deployment ' RELEASE-NAME-airsonic' should set ' spec.securityContext.runAsGroup' , ' spec.securityContext.supplementalGroups[*]' and ' spec.securityContext.fsGroup' to integer greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv029" > https://avd.aquasec.com/appshield/ksv029< / a > < br > < / details > |
2021-12-04 20:11:45 +00:00
## Containers
##### Detected Containers
2022-03-26 15:30:42 +00:00
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
2021-12-04 20:11:45 +00:00
tccr.io/truecharts/airsonic:version-v10.6.2@sha256:f0065aa44fb1c38b7fc30d34e220138dc0a0c6477b78eb7f59015622c2052030
##### Scan Results
2022-03-26 15:30:42 +00:00
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
2022-02-06 17:25:51 +00:00
**alpine**
2022-03-30 20:23:21 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-04-20 21:21:59 +00:00
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4" > https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" > https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5< / a > < br > < a href = "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ" > https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" > https://nvd.nist.gov/vuln/detail/CVE-2018-25032< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5359-1" > https://ubuntu.com/security/notices/USN-5359-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5111" > https://www.debian.org/security/2022/dsa-5111< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/24/1" > https://www.openwall.com/lists/oss-security/2022/03/24/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/1" > https://www.openwall.com/lists/oss-security/2022/03/28/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/3" > https://www.openwall.com/lists/oss-security/2022/03/28/3< / a > < br > < / details > |
2022-03-26 15:30:42 +00:00
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
2021-12-05 00:50:14 +00:00
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
**alpine**
2021-12-04 20:34:35 +00:00
2022-03-30 20:23:21 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-04-20 21:21:59 +00:00
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4" > https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" > https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5< / a > < br > < a href = "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ" > https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" > https://nvd.nist.gov/vuln/detail/CVE-2018-25032< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5359-1" > https://ubuntu.com/security/notices/USN-5359-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5111" > https://www.debian.org/security/2022/dsa-5111< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/24/1" > https://www.openwall.com/lists/oss-security/2022/03/24/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/1" > https://www.openwall.com/lists/oss-security/2022/03/28/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/3" > https://www.openwall.com/lists/oss-security/2022/03/28/3< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
2021-12-04 20:11:45 +00:00
2021-12-05 00:50:14 +00:00
#### Container: tccr.io/truecharts/airsonic:version-v10.6.2@sha256:f0065aa44fb1c38b7fc30d34e220138dc0a0c6477b78eb7f59015622c2052030 (ubuntu 18.04)
2021-12-04 20:11:45 +00:00
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
**ubuntu**
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-04-20 21:21:59 +00:00
| bash | CVE-2019-18276 | LOW | 4.4.18-2ubuntu1.2 | 4.4.18-2ubuntu1.3 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html" > http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-18276" > https://access.redhat.com/security/cve/CVE-2019-18276< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276< / a > < br > < a href = "https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff" > https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-18276.html" > https://linux.oracle.com/cve/CVE-2019-18276.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1679.html" > https://linux.oracle.com/errata/ELSA-2021-1679.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-18276" > https://nvd.nist.gov/vuln/detail/CVE-2019-18276< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-34" > https://security.gentoo.org/glsa/202105-34< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200430-0003/" > https://security.netapp.com/advisory/ntap-20200430-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5380-1" > https://ubuntu.com/security/notices/USN-5380-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.youtube.com/watch?v=-wGtxJ8opa8" > https://www.youtube.com/watch?v=-wGtxJ8opa8< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| coreutils | CVE-2016-2781 | LOW | 8.28-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| ffmpeg | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| ffmpeg | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| ffmpeg | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| ffmpeg | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| ffmpeg | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| ffmpeg | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| ffmpeg | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| ffmpeg | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| ffmpeg | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| ffmpeg | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| ffmpeg | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| ffmpeg | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| ffmpeg | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| ffmpeg | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| ffmpeg | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| ffmpeg | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| ffmpeg | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| ffmpeg | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| flac | CVE-2020-0499 | LOW | 1.3.2-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-0499" > https://access.redhat.com/security/cve/CVE-2020-0499< / a > < br > < a href = "https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0" > https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/< / a > < br > < a href = "https://source.android.com/security/bulletin/pixel/2020-12-01" > https://source.android.com/security/bulletin/pixel/2020-12-01< / a > < br > < / details > |
| gcc-8-base | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13844" > https://access.redhat.com/security/cve/CVE-2020-13844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
| gpgv | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html< / a > < br > < a href = "https://access.redhat.com/articles/4264021" > https://access.redhat.com/articles/4264021< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-13050" > https://access.redhat.com/security/cve/CVE-2019-13050< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050< / a > < br > < a href = "https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" > https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13050.html" > https://linux.oracle.com/cve/CVE-2019-13050.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4490.html" > https://linux.oracle.com/errata/ELSA-2020-4490.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551" > https://support.f5.com/csp/article/K08654551< / a > < br > < a href = "https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K08654551?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/" > https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/< / a > < br > < a href = "https://twitter.com/lambdafu/status/1147162583969009664" > https://twitter.com/lambdafu/status/1147162583969009664< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| gzip | CVE-2022-1271 | MEDIUM | 1.6-5ubuntu1.1 | 1.6-5ubuntu1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1271" > https://access.redhat.com/security/cve/CVE-2022-1271< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271< / a > < br > < a href = "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html" > https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-1" > https://ubuntu.com/security/notices/USN-5378-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-2" > https://ubuntu.com/security/notices/USN-5378-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-3" > https://ubuntu.com/security/notices/USN-5378-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-4" > https://ubuntu.com/security/notices/USN-5378-4< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/04/07/8" > https://www.openwall.com/lists/oss-security/2022/04/07/8< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| krb5-locales | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763" > http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20217" > https://access.redhat.com/security/cve/CVE-2018-20217< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217< / a > < br > < a href = "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" > https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190416-0006/" > https://security.netapp.com/advisory/ntap-20190416-0006/< / a > < br > < / details > |
| krb5-locales | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| krb5-locales | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| krb5-locales | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5710" > https://access.redhat.com/security/cve/CVE-2018-5710< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)< / a > < br > < / details > |
| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.12-4ubuntu5.1 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.launchpad.net/apparmor/+bug/1597017" > https://bugs.launchpad.net/apparmor/+bug/1597017< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-1585" > https://nvd.nist.gov/vuln/detail/CVE-2016-1585< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libasn1-8-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2022-03-26 15:30:42 +00:00
| libass9 | CVE-2020-36430 | MEDIUM | 1:0.14.0-1 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36430" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36430< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml< / a > < br > < a href = "https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632" > https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JUXFQUJ32GWG5E46A63DFDCYJAF3VU6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JUXFQUJ32GWG5E46A63DFDCYJAF3VU6/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libavahi-client3 | CVE-2021-26720 | LOW | 0.7-3.1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824" > https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824< / a > < br > < a href = "https://bugzilla.suse.com/show_bug.cgi?id=1180827" > https://bugzilla.suse.com/show_bug.cgi?id=1180827< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720< / a > < br > < a href = "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog" > https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-26720" > https://nvd.nist.gov/vuln/detail/CVE-2021-26720< / a > < br > < a href = "https://packages.debian.org/bullseye/avahi-daemon" > https://packages.debian.org/bullseye/avahi-daemon< / a > < br > < a href = "https://packages.debian.org/buster/avahi-daemon" > https://packages.debian.org/buster/avahi-daemon< / a > < br > < a href = "https://packages.debian.org/sid/avahi-daemon" > https://packages.debian.org/sid/avahi-daemon< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2021-26720" > https://security-tracker.debian.org/tracker/CVE-2021-26720< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2021/02/15/2" > https://www.openwall.com/lists/oss-security/2021/02/15/2< / a > < br > < / details > |
| libavahi-common-data | CVE-2021-26720 | LOW | 0.7-3.1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824" > https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824< / a > < br > < a href = "https://bugzilla.suse.com/show_bug.cgi?id=1180827" > https://bugzilla.suse.com/show_bug.cgi?id=1180827< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720< / a > < br > < a href = "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog" > https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-26720" > https://nvd.nist.gov/vuln/detail/CVE-2021-26720< / a > < br > < a href = "https://packages.debian.org/bullseye/avahi-daemon" > https://packages.debian.org/bullseye/avahi-daemon< / a > < br > < a href = "https://packages.debian.org/buster/avahi-daemon" > https://packages.debian.org/buster/avahi-daemon< / a > < br > < a href = "https://packages.debian.org/sid/avahi-daemon" > https://packages.debian.org/sid/avahi-daemon< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2021-26720" > https://security-tracker.debian.org/tracker/CVE-2021-26720< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2021/02/15/2" > https://www.openwall.com/lists/oss-security/2021/02/15/2< / a > < br > < / details > |
| libavahi-common3 | CVE-2021-26720 | LOW | 0.7-3.1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824" > https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824< / a > < br > < a href = "https://bugzilla.suse.com/show_bug.cgi?id=1180827" > https://bugzilla.suse.com/show_bug.cgi?id=1180827< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720< / a > < br > < a href = "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog" > https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-26720" > https://nvd.nist.gov/vuln/detail/CVE-2021-26720< / a > < br > < a href = "https://packages.debian.org/bullseye/avahi-daemon" > https://packages.debian.org/bullseye/avahi-daemon< / a > < br > < a href = "https://packages.debian.org/buster/avahi-daemon" > https://packages.debian.org/buster/avahi-daemon< / a > < br > < a href = "https://packages.debian.org/sid/avahi-daemon" > https://packages.debian.org/sid/avahi-daemon< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2021-26720" > https://security-tracker.debian.org/tracker/CVE-2021-26720< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2021/02/15/2" > https://www.openwall.com/lists/oss-security/2021/02/15/2< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavcodec57 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libavcodec57 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libavcodec57 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libavcodec57 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libavcodec57 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libavcodec57 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavcodec57 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavcodec57 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libavcodec57 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavcodec57 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libavcodec57 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libavcodec57 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavdevice57 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libavdevice57 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libavdevice57 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libavdevice57 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libavdevice57 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libavdevice57 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavdevice57 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavdevice57 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libavdevice57 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavdevice57 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libavdevice57 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libavdevice57 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavfilter6 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libavfilter6 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libavfilter6 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libavfilter6 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libavfilter6 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libavfilter6 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavfilter6 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavfilter6 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libavfilter6 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavfilter6 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libavfilter6 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libavfilter6 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavformat57 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libavformat57 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libavformat57 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libavformat57 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libavformat57 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libavformat57 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libavformat57 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libavformat57 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libavformat57 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libavformat57 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libavformat57 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libavformat57 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavformat57 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavformat57 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libavformat57 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavformat57 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libavformat57 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libavformat57 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavresample3 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libavresample3 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libavresample3 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libavresample3 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libavresample3 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libavresample3 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libavresample3 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libavresample3 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libavresample3 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libavresample3 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libavresample3 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libavresample3 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavresample3 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavresample3 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libavresample3 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavresample3 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libavresample3 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libavresample3 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavutil55 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libavutil55 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libavutil55 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libavutil55 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libavutil55 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libavutil55 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libavutil55 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libavutil55 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libavutil55 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libavutil55 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libavutil55 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libavutil55 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libavutil55 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libavutil55 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libavutil55 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libavutil55 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libavutil55 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libavutil55 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc-bin | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2009-5155" > https://access.redhat.com/security/cve/CVE-2009-5155< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| libc-bin | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-8985" > https://access.redhat.com/security/cve/CVE-2015-8985< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10228" > https://access.redhat.com/security/cve/CVE-2016-10228< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc-bin | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10739" > https://access.redhat.com/security/cve/CVE-2016-10739< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" > https://nvd.nist.gov/vuln/detail/CVE-2016-10739< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-25013" > https://access.redhat.com/security/cve/CVE-2019-25013< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-25013" > https://nvd.nist.gov/vuln/detail/CVE-2019-25013< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=com
| libc-bin | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27618" > https://access.redhat.com/security/cve/CVE-2020-27618< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-27618" > https://nvd.nist.gov/vuln/detail/CVE-2020-27618< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc-bin | CVE-2020-29562 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-29562" > https://access.redhat.com/security/cve/CVE-2020-29562< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210122-0004/" > https://security.netapp.com/advisory/ntap-20210122-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" > https://sourceware.org/bugzilla/show_bug.cgi?id=26923< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html" > https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| libc-bin | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-6096" > https://access.redhat.com/security/cve/CVE-2020-6096< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" > https://nvd.nist.gov/vuln/detail/CVE-2020-6096< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3326" > https://access.redhat.com/security/cve/CVE-2021-3326< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3326" > https://nvd.nist.gov/vuln/detail/CVE-2021-3326< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc-bin | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-35942" > https://access.redhat.com/security/cve/CVE-2021-35942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-35942" > https://nvd.nist.gov/vuln/detail/CVE-2021-35942< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| libc-bin | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23218" > https://access.redhat.com/security/cve/CVE-2022-23218< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23218.html" > https://linux.oracle.com/cve/CVE-2022-23218.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23218" > https://nvd.nist.gov/vuln/detail/CVE-2022-23218< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" > https://sourceware.org/bugzilla/show_bug.cgi?id=28768< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| libc-bin | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23219" > https://access.redhat.com/security/cve/CVE-2022-23219< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23219.html" > https://linux.oracle.com/cve/CVE-2022-23219.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23219" > https://nvd.nist.gov/vuln/detail/CVE-2022-23219< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" > https://sourceware.org/bugzilla/show_bug.cgi?id=22542< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| libc6 | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc6 | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2009-5155" > https://access.redhat.com/security/cve/CVE-2009-5155< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| libc6 | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-8985" > https://access.redhat.com/security/cve/CVE-2015-8985< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10228" > https://access.redhat.com/security/cve/CVE-2016-10228< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc6 | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10739" > https://access.redhat.com/security/cve/CVE-2016-10739< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" > https://nvd.nist.gov/vuln/detail/CVE-2016-10739< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-25013" > https://access.redhat.com/security/cve/CVE-2019-25013< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-25013" > https://nvd.nist.gov/vuln/detail/CVE-2019-25013< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit
| libc6 | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27618" > https://access.redhat.com/security/cve/CVE-2020-27618< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-27618" > https://nvd.nist.gov/vuln/detail/CVE-2020-27618< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc6 | CVE-2020-29562 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-29562" > https://access.redhat.com/security/cve/CVE-2020-29562< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210122-0004/" > https://security.netapp.com/advisory/ntap-20210122-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" > https://sourceware.org/bugzilla/show_bug.cgi?id=26923< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html" > https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| libc6 | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-6096" > https://access.redhat.com/security/cve/CVE-2020-6096< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" > https://nvd.nist.gov/vuln/detail/CVE-2020-6096< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3326" > https://access.redhat.com/security/cve/CVE-2021-3326< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3326" > https://nvd.nist.gov/vuln/detail/CVE-2021-3326< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libc6 | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-35942" > https://access.redhat.com/security/cve/CVE-2021-35942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-35942" > https://nvd.nist.gov/vuln/detail/CVE-2021-35942< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| libc6 | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23218" > https://access.redhat.com/security/cve/CVE-2022-23218< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23218.html" > https://linux.oracle.com/cve/CVE-2022-23218.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23218" > https://nvd.nist.gov/vuln/detail/CVE-2022-23218< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" > https://sourceware.org/bugzilla/show_bug.cgi?id=28768< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| libc6 | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23219" > https://access.redhat.com/security/cve/CVE-2022-23219< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23219.html" > https://linux.oracle.com/cve/CVE-2022-23219.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23219" > https://nvd.nist.gov/vuln/detail/CVE-2022-23219< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" > https://sourceware.org/bugzilla/show_bug.cgi?id=22542< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| libcairo2 | CVE-2017-7475 | LOW | 1.15.10-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2017/q2/151" > http://seclists.org/oss-sec/2017/q2/151< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7475" > https://access.redhat.com/security/cve/CVE-2017-7475< / a > < br > < a href = "https://bugs.freedesktop.org/show_bug.cgi?id=100763" > https://bugs.freedesktop.org/show_bug.cgi?id=100763< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475< / a > < br > < a href = "https://github.com/advisories/GHSA-5v3f-73gv-x7x5" > https://github.com/advisories/GHSA-5v3f-73gv-x7x5< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2017-7475" > https://nvd.nist.gov/vuln/detail/CVE-2017-7475< / a > < br > < / details > |
| libcairo2 | CVE-2017-9814 | LOW | 1.15.10-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-9814" > https://access.redhat.com/security/cve/CVE-2017-9814< / a > < br > < a href = "https://bugs.freedesktop.org/show_bug.cgi?id=101547" > https://bugs.freedesktop.org/show_bug.cgi?id=101547< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/201904-01" > https://security.gentoo.org/glsa/201904-01< / a > < br > < / details > |
| libcairo2 | CVE-2018-18064 | LOW | 1.15.10-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-18064" > https://access.redhat.com/security/cve/CVE-2018-18064< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064< / a > < br > < a href = "https://gitlab.freedesktop.org/cairo/cairo/issues/341" > https://gitlab.freedesktop.org/cairo/cairo/issues/341< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libcairo2 | CVE-2019-6461 | LOW | 1.15.10-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-6461" > https://access.redhat.com/security/cve/CVE-2019-6461< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461< / a > < br > < a href = "https://github.com/TeamSeri0us/pocs/tree/master/gerbv" > https://github.com/TeamSeri0us/pocs/tree/master/gerbv< / a > < br > < a href = "https://gitlab.freedesktop.org/cairo/cairo/issues/352" > https://gitlab.freedesktop.org/cairo/cairo/issues/352< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-6461" > https://nvd.nist.gov/vuln/detail/CVE-2019-6461< / a > < br > < / details > |
| libcairo2 | CVE-2019-6462 | LOW | 1.15.10-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-6462" > https://access.redhat.com/security/cve/CVE-2019-6462< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462< / a > < br > < a href = "https://github.com/TeamSeri0us/pocs/tree/master/gerbv" > https://github.com/TeamSeri0us/pocs/tree/master/gerbv< / a > < br > < a href = "https://gitlab.freedesktop.org/cairo/cairo/issues/353" > https://gitlab.freedesktop.org/cairo/cairo/issues/353< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-6462" > https://nvd.nist.gov/vuln/detail/CVE-2019-6462< / a > < br > < / details > |
| libcdio17 | CVE-2017-18201 | LOW | 1.0.0-2ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/103190" > http://www.securityfocus.com/bid/103190< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:3246" > https://access.redhat.com/errata/RHSA-2018:3246< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-18201" > https://access.redhat.com/security/cve/CVE-2017-18201< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887640" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887640< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18201" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18201< / a > < br > < a href = "https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d" > https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2017-18201.html" > https://linux.oracle.com/cve/CVE-2017-18201.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2018-3246.html" > https://linux.oracle.com/errata/ELSA-2018-3246.html< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libcroco3 | CVE-2017-7960 | LOW | 0.6.12-2 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7960" > https://access.redhat.com/security/cve/CVE-2017-7960< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/" > https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960< / a > < br > < a href = "https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394" > https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394< / a > < br > < a href = "https://security.gentoo.org/glsa/201707-13" > https://security.gentoo.org/glsa/201707-13< / a > < br > < / details > |
| libcroco3 | CVE-2017-8834 | LOW | 0.6.12-2 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2017/Jun/10" > http://seclists.org/fulldisclosure/2017/Jun/10< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2020/08/13/3" > http://www.openwall.com/lists/oss-security/2020/08/13/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-8834" > https://access.redhat.com/security/cve/CVE-2017-8834< / a > < br > < a href = "https://bugzilla.gnome.org/show_bug.cgi?id=782647" > https://bugzilla.gnome.org/show_bug.cgi?id=782647< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834< / a > < br > < a href = "https://www.exploit-db.com/exploits/42147/" > https://www.exploit-db.com/exploits/42147/< / a > < br > < / details > |
| libcroco3 | CVE-2017-8871 | LOW | 0.6.12-2 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2017/Jun/10" > http://seclists.org/fulldisclosure/2017/Jun/10< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2020/08/13/3" > http://www.openwall.com/lists/oss-security/2020/08/13/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-8871" > https://access.redhat.com/security/cve/CVE-2017-8871< / a > < br > < a href = "https://bugzilla.gnome.org/show_bug.cgi?id=782649" > https://bugzilla.gnome.org/show_bug.cgi?id=782649< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871< / a > < br > < a href = "https://www.exploit-db.com/exploits/42147/" > https://www.exploit-db.com/exploits/42147/< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libcroco3 | CVE-2020-12825 | LOW | 0.6.12-2 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2020/08/13/3" > http://www.openwall.com/lists/oss-security/2020/08/13/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2020/09/08/3" > http://www.openwall.com/lists/oss-security/2020/09/08/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-12825" > https://access.redhat.com/security/cve/CVE-2020-12825< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/libcroco/-/issues/8" > https://gitlab.gnome.org/GNOME/libcroco/-/issues/8< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-12825.html" > https://linux.oracle.com/cve/CVE-2020-12825.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4072.html" > https://linux.oracle.com/errata/ELSA-2020-4072.html< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libcups2 | CVE-2019-8842 | LOW | 2.2.7-1ubuntu2.8 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT210788" > https://support.apple.com/en-us/HT210788< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libcups2 | CVE-2020-10001 | LOW | 2.2.7-1ubuntu2.8 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-10001" > https://access.redhat.com/security/cve/CVE-2020-10001< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-10001.html" > https://linux.oracle.com/cve/CVE-2020-10001.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4393.html" > https://linux.oracle.com/errata/ELSA-2021-4393.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html< / a > < br > < a href = "https://support.apple.com/en-us/HT212011" > https://support.apple.com/en-us/HT212011< / a > < br > < / details > |
| libdbus-1-3 | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-35512" > https://access.redhat.com/security/cve/CVE-2020-35512< / a > < br > < a href = "https://bugs.gentoo.org/755392" > https://bugs.gentoo.org/755392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1909101" > https://bugzilla.redhat.com/show_bug.cgi?id=1909101< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512< / a > < br > < a href = "https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)" > https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)< / a > < br > < a href = "https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)" > https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)< / a > < br > < a href = "https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)" > https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)< / a > < br > < a href = "https://gitlab.freedesktop.org/dbus/dbus/-/issues/305" > https://gitlab.freedesktop.org/dbus/dbus/-/issues/305< / a > < br > < a href = "https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128" > https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2020-35512" > https://security-tracker.debian.org/tracker/CVE-2020-35512< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5244-1" > https://ubuntu.com/security/notices/USN-5244-1< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libexpat1 | CVE-2022-25235 | HIGH | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25235" > https://access.redhat.com/security/cve/CVE-2022-25235< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/562" > https://github.com/libexpat/libexpat/pull/562< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)" > https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)" > https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-25235.html" > https://linux.oracle.com/cve/CVE-2022-25235.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25235" > https://nvd.nist.gov/vuln/detail/CVE-2022-25235< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libexpat1 | CVE-2022-25236 | HIGH | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25236" > https://access.redhat.com/security/cve/CVE-2022-25236< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/561" > https://github.com/libexpat/libexpat/pull/561< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)" > https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)" > https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/577" > https://github.com/libexpat/libexpat/pull/577< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-25236.html" > https://linux.oracle.com/cve/CVE-2022-25236.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25236" > https://nvd.nist.gov/vuln/detail/CVE-2022-25236< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libexpat1 | CVE-2021-46143 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-46143" > https://access.redhat.com/security/cve/CVE-2021-46143< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143< / a > < br > < a href = "https://github.com/libexpat/libexpat/issues/532" > https://github.com/libexpat/libexpat/issues/532< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/538" > https://github.com/libexpat/libexpat/pull/538< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46143.html" > https://linux.oracle.com/cve/CVE-2021-46143.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9227.html" > https://linux.oracle.com/errata/ELSA-2022-9227.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46143" > https://nvd.nist.gov/vuln/detail/CVE-2021-46143< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0006/" > https://security.netapp.com/advisory/ntap-20220121-0006/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-22822 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22822" > https://access.redhat.com/security/cve/CVE-2022-22822< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22822.html" > https://linux.oracle.com/cve/CVE-2022-22822.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22822" > https://nvd.nist.gov/vuln/detail/CVE-2022-22822< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-22823 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22823" > https://access.redhat.com/security/cve/CVE-2022-22823< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22823.html" > https://linux.oracle.com/cve/CVE-2022-22823.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22823" > https://nvd.nist.gov/vuln/detail/CVE-2022-22823< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-22824 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22824" > https://access.redhat.com/security/cve/CVE-2022-22824< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22824.html" > https://linux.oracle.com/cve/CVE-2022-22824.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22824" > https://nvd.nist.gov/vuln/detail/CVE-2022-22824< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-22825 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22825" > https://access.redhat.com/security/cve/CVE-2022-22825< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22825.html" > https://linux.oracle.com/cve/CVE-2022-22825.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22825" > https://nvd.nist.gov/vuln/detail/CVE-2022-22825< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-22826 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22826" > https://access.redhat.com/security/cve/CVE-2022-22826< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22826.html" > https://linux.oracle.com/cve/CVE-2022-22826.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22826" > https://nvd.nist.gov/vuln/detail/CVE-2022-22826< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-22827 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22827" > https://access.redhat.com/security/cve/CVE-2022-22827< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22827.html" > https://linux.oracle.com/cve/CVE-2022-22827.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22827" > https://nvd.nist.gov/vuln/detail/CVE-2022-22827< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23852" > https://access.redhat.com/security/cve/CVE-2022-23852< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/550" > https://github.com/libexpat/libexpat/pull/550< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23852.html" > https://linux.oracle.com/cve/CVE-2022-23852.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23852" > https://nvd.nist.gov/vuln/detail/CVE-2022-23852< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220217-0001/" > https://security.netapp.com/advisory/ntap-20220217-0001/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23990" > https://access.redhat.com/security/cve/CVE-2022-23990< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/551" > https://github.com/libexpat/libexpat/pull/551< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23990.html" > https://linux.oracle.com/cve/CVE-2022-23990.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9232.html" > https://linux.oracle.com/errata/ELSA-2022-9232.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23990" > https://nvd.nist.gov/vuln/detail/CVE-2022-23990< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| libexpat1 | CVE-2022-25313 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.7 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25313" > https://access.redhat.com/security/cve/CVE-2022-25313< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/558" > https://github.com/libexpat/libexpat/pull/558< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25313" > https://nvd.nist.gov/vuln/detail/CVE-2022-25313< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5320-1" > https://ubuntu.com/security/notices/USN-5320-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libexpat1 | CVE-2022-25314 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.7 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25314" > https://access.redhat.com/security/cve/CVE-2022-25314< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/560" > https://github.com/libexpat/libexpat/pull/560< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25314" > https://nvd.nist.gov/vuln/detail/CVE-2022-25314< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5320-1" > https://ubuntu.com/security/notices/USN-5320-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libexpat1 | CVE-2022-25315 | MEDIUM | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.7 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25315" > https://access.redhat.com/security/cve/CVE-2022-25315< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/559" > https://github.com/libexpat/libexpat/pull/559< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-25315.html" > https://linux.oracle.com/cve/CVE-2022-25315.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25315" > https://nvd.nist.gov/vuln/detail/CVE-2022-25315< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5320-1" > https://ubuntu.com/security/notices/USN-5320-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libexpat1 | CVE-2021-45960 | LOW | 2.2.5-3ubuntu0.2 | 2.2.5-3ubuntu0.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-45960" > https://access.redhat.com/security/cve/CVE-2021-45960< / a > < br > < a href = "https://bugzilla.mozilla.org/show_bug.cgi?id=1217609" > https://bugzilla.mozilla.org/show_bug.cgi?id=1217609< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960< / a > < br > < a href = "https://github.com/libexpat/libexpat/issues/531" > https://github.com/libexpat/libexpat/issues/531< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/534" > https://github.com/libexpat/libexpat/pull/534< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea" > https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-45960.html" > https://linux.oracle.com/cve/CVE-2021-45960.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-45960" > https://nvd.nist.gov/vuln/detail/CVE-2021-45960< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0004/" > https://security.netapp.com/advisory/ntap-20220121-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libflac8 | CVE-2020-0499 | LOW | 1.3.2-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-0499" > https://access.redhat.com/security/cve/CVE-2020-0499< / a > < br > < a href = "https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0" > https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/< / a > < br > < a href = "https://source.android.com/security/bulletin/pixel/2020-12-01" > https://source.android.com/security/bulletin/pixel/2020-12-01< / a > < br > < / details > |
2022-04-12 17:24:36 +00:00
| libfribidi0 | CVE-2022-25308 | MEDIUM | 0.19.7-2 | 0.19.7-2ubuntu0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-25308" > https://access.redhat.com/security/cve/CVE-2022-25308< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25308" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25308< / a > < br > < a href = "https://github.com/fribidi/fribidi/commit/ad3a19e6372b1e667128ed1ea2f49919884587e1" > https://github.com/fribidi/fribidi/commit/ad3a19e6372b1e667128ed1ea2f49919884587e1< / a > < br > < a href = "https://github.com/fribidi/fribidi/issues/181" > https://github.com/fribidi/fribidi/issues/181< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5366-1" > https://ubuntu.com/security/notices/USN-5366-1< / a > < br > < / details > |
| libfribidi0 | CVE-2022-25309 | MEDIUM | 0.19.7-2 | 0.19.7-2ubuntu0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-25309" > https://access.redhat.com/security/cve/CVE-2022-25309< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25309" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25309< / a > < br > < a href = "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3" > https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3< / a > < br > < a href = "https://github.com/fribidi/fribidi/issues/182" > https://github.com/fribidi/fribidi/issues/182< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5366-1" > https://ubuntu.com/security/notices/USN-5366-1< / a > < br > < / details > |
| libfribidi0 | CVE-2022-25310 | MEDIUM | 0.19.7-2 | 0.19.7-2ubuntu0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-25310" > https://access.redhat.com/security/cve/CVE-2022-25310< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25310" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25310< / a > < br > < a href = "https://github.com/fribidi/fribidi/commit/175850b03e1af251d705c1d04b2b9b3c1c06e48f" > https://github.com/fribidi/fribidi/commit/175850b03e1af251d705c1d04b2b9b3c1c06e48f< / a > < br > < a href = "https://github.com/fribidi/fribidi/issues/183" > https://github.com/fribidi/fribidi/issues/183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5366-1" > https://ubuntu.com/security/notices/USN-5366-1< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13844" > https://access.redhat.com/security/cve/CVE-2020-13844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
| libgdk-pixbuf2.0-0 | CVE-2021-44648 | MEDIUM | 2.36.11-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44648" > https://access.redhat.com/security/cve/CVE-2021-44648< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136" > https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/< / a > < br > < a href = "https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/" > https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/< / a > < br > < / details > |
| libgdk-pixbuf2.0-common | CVE-2021-44648 | MEDIUM | 2.36.11-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44648" > https://access.redhat.com/security/cve/CVE-2021-44648< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136" > https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/< / a > < br > < a href = "https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/" > https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/< / a > < br > < / details > |
| libgif7 | CVE-2020-23922 | LOW | 5.1.4-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-23922" > https://access.redhat.com/security/cve/CVE-2020-23922< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://sourceforge.net/p/giflib/bugs/151/" > https://sourceforge.net/p/giflib/bugs/151/< / a > < br > < / details > |
2021-12-14 20:47:51 +00:00
| libglib2.0-0 | CVE-2021-3800 | MEDIUM | 2.56.4-0ubuntu0.18.04.8 | 2.56.4-0ubuntu0.18.04.9 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3800" > https://access.redhat.com/security/cve/CVE-2021-3800< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3800.html" > https://linux.oracle.com/cve/CVE-2021-3800.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4385.html" > https://linux.oracle.com/errata/ELSA-2021-4385.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5189-1" > https://ubuntu.com/security/notices/USN-5189-1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2017/06/23/8" > https://www.openwall.com/lists/oss-security/2017/06/23/8< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libgnutls30 | CVE-2018-16868 | LOW | 3.5.18-1ubuntu1.5 | | < details > < summary > Expand...< / summary > < a href = "http://cat.eyalro.net/" > http://cat.eyalro.net/< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html" > http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html" > http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106080" > http://www.securityfocus.com/bid/106080< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-16868" > https://access.redhat.com/security/cve/CVE-2018-16868< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868< / a > < br > < / details > |
| libgomp1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13844" > https://access.redhat.com/security/cve/CVE-2020-13844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763" > http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20217" > https://access.redhat.com/security/cve/CVE-2018-20217< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217< / a > < br > < a href = "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" > https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190416-0006/" > https://security.netapp.com/advisory/ntap-20190416-0006/< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5710" > https://access.redhat.com/security/cve/CVE-2018-5710< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libgssapi3-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libhcrypto4-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libheimbase1-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libheimntlm0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libhx509-5-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libjack-jackd2-0 | CVE-2019-13351 | LOW | 1.9.12~dfsg-2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13351< / a > < br > < a href = "https://github.com/jackaudio/jack2/pull/480" > https://github.com/jackaudio/jack2/pull/480< / a > < br > < a href = "https://github.com/xbmc/xbmc/issues/16258" > https://github.com/xbmc/xbmc/issues/16258< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.maptools.org/show_bug.cgi?id=2707" > http://bugzilla.maptools.org/show_bug.cgi?id=2707< / a > < br > < a href = "http://www.securityfocus.com/bid/99304" > http://www.securityfocus.com/bid/99304< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-9937" > https://access.redhat.com/security/cve/CVE-2017-9937< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libjpeg-turbo8 | CVE-2018-11813 | LOW | 1.5.2-0ubuntu5.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html" > http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html< / a > < br > < a href = "http://www.ijg.org/files/jpegsrc.v9d.tar.gz" > http://www.ijg.org/files/jpegsrc.v9d.tar.gz< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2052" > https://access.redhat.com/errata/RHSA-2019:2052< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-11813" > https://access.redhat.com/security/cve/CVE-2018-11813< / a > < br > < a href = "https://bugs.gentoo.org/727908" > https://bugs.gentoo.org/727908< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813< / a > < br > < a href = "https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf" > https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf< / a > < br > < a href = "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c" > https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-11813.html" > https://linux.oracle.com/cve/CVE-2018-11813.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-2052.html" > https://linux.oracle.com/errata/ELSA-2019-2052.html< / a > < br > < / details > |
| libjpeg-turbo8 | CVE-2020-17541 | LOW | 1.5.2-0ubuntu5.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-17541" > https://access.redhat.com/security/cve/CVE-2020-17541< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541< / a > < br > < a href = "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392" > https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-17541.html" > https://linux.oracle.com/cve/CVE-2020-17541.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4288.html" > https://linux.oracle.com/errata/ELSA-2021-4288.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-17541" > https://nvd.nist.gov/vuln/detail/CVE-2020-17541< / a > < br > < / details > |
| libk5crypto3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763" > http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20217" > https://access.redhat.com/security/cve/CVE-2018-20217< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217< / a > < br > < a href = "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" > https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190416-0006/" > https://security.netapp.com/advisory/ntap-20190416-0006/< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libk5crypto3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5710" > https://access.redhat.com/security/cve/CVE-2018-5710< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libkrb5-26-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libkrb5-3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763" > http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20217" > https://access.redhat.com/security/cve/CVE-2018-20217< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217< / a > < br > < a href = "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" > https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190416-0006/" > https://security.netapp.com/advisory/ntap-20190416-0006/< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libkrb5-3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5710" > https://access.redhat.com/security/cve/CVE-2018-5710< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)< / a > < br > < / details > |
| libkrb5support0 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763" > http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20217" > https://access.redhat.com/security/cve/CVE-2018-20217< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217< / a > < br > < a href = "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" > https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190416-0006/" > https://security.netapp.com/advisory/ntap-20190416-0006/< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libkrb5support0 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5710" > https://access.redhat.com/security/cve/CVE-2018-5710< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| liblzma5 | CVE-2022-1271 | MEDIUM | 5.2.2-1.3 | 5.2.2-1.3ubuntu0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1271" > https://access.redhat.com/security/cve/CVE-2022-1271< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271< / a > < br > < a href = "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html" > https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-1" > https://ubuntu.com/security/notices/USN-5378-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-2" > https://ubuntu.com/security/notices/USN-5378-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-3" > https://ubuntu.com/security/notices/USN-5378-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-4" > https://ubuntu.com/security/notices/USN-5378-4< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/04/07/8" > https://www.openwall.com/lists/oss-security/2022/04/07/8< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libmysofa0 | CVE-2019-20016 | MEDIUM | 0.6~dfsg0-3+deb10u1build1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20016< / a > < br > < a href = "https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f" > https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f< / a > < br > < a href = "https://github.com/hoene/libmysofa/issues/83" > https://github.com/hoene/libmysofa/issues/83< / a > < br > < a href = "https://github.com/hoene/libmysofa/issues/84" > https://github.com/hoene/libmysofa/issues/84< / a > < br > < / details > |
| libmysofa0 | CVE-2019-20063 | MEDIUM | 0.6~dfsg0-3+deb10u1build1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20063" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20063< / a > < br > < a href = "https://github.com/hoene/libmysofa/commit/ecb7b743b6f6d47b93a7bc680a60071a0f9524c6" > https://github.com/hoene/libmysofa/commit/ecb7b743b6f6d47b93a7bc680a60071a0f9524c6< / a > < br > < a href = "https://github.com/hoene/libmysofa/compare/v0.7...v0.8" > https://github.com/hoene/libmysofa/compare/v0.7...v0.8< / a > < br > < a href = "https://github.com/hoene/libmysofa/issues/67" > https://github.com/hoene/libmysofa/issues/67< / a > < br > < / details > |
2021-12-18 20:15:26 +00:00
| libmysofa0 | CVE-2020-6860 | MEDIUM | 0.6~dfsg0-3+deb10u1build1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6860" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6860< / a > < br > < a href = "https://github.com/hoene/libmysofa/commit/c31120a4ddfe3fc705cfdd74da7e884e1866da85" > https://github.com/hoene/libmysofa/commit/c31120a4ddfe3fc705cfdd74da7e884e1866da85< / a > < br > < a href = "https://github.com/hoene/libmysofa/issues/96" > https://github.com/hoene/libmysofa/issues/96< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/< / a > < br > < / details > |
| libmysofa0 | CVE-2021-3756 | MEDIUM | 0.6~dfsg0-3+deb10u1build1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3756" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3756< / a > < br > < a href = "https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1" > https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1< / a > < br > < a href = "https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 (v1.2.1)" > https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 (v1.2.1)< / a > < br > < a href = "https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1" > https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1< / a > < br > < a href = "https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/" > https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17594" > https://access.redhat.com/security/cve/CVE-2019-17594< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17595" > https://access.redhat.com/security/cve/CVE-2019-17595< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17594" > https://access.redhat.com/security/cve/CVE-2019-17594< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17595" > https://access.redhat.com/security/cve/CVE-2019-17595< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libnghttp2-14 | CVE-2019-9511 | MEDIUM | 1.30.0-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2692" > https://access.redhat.com/errata/RHSA-2019:2692< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2745" > https://access.redhat.com/errata/RHSA-2019:2745< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2746" > https://access.redhat.com/errata/RHSA-2019:2746< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2775" > https://access.redhat.com/errata/RHSA-2019:2775< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2799" > https://access.redhat.com/errata/RHSA-2019:2799< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2925" > https://access.redhat.com/errata/RHSA-2019:2925< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2939" > https://access.redhat.com/errata/RHSA-2019:2939< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2949" > https://access.redhat.com/errata/RHSA-2019:2949< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2955" > https://access.redhat.com/errata/RHSA-2019:2955< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2966" > https://access.redhat.com/errata/RHSA-2019:2966< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3041" > https://access.redhat.com/errata/RHSA-2019:3041< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3932" > https://access.redhat.com/errata/RHSA-2019:3932< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3933" > https://access.redhat.com/errata/RHSA-2019:3933< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3935" > https://access.redhat.com/errata/RHSA-2019:3935< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:4018" > https://access.redhat.com/errata/RHSA-2019:4018< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:4019" > https://access.redhat.com/errata/RHSA-2019:4019< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:4020" > https://access.redhat.com/errata/RHSA-2019:4020< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:4021" > https://access.redhat.com/errata/RHSA-2019:4021< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-9511" > https://access.redhat.com/security/cve/CVE-2019-9511< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511< / a > < br > < a href = "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" > https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md< / a > < br > < a href = "https://kb.cert.org/vuls/id/605641/" > https://kb.cert.org/vuls/id/605641/< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10296" > https://kc.mcafee.com/corporate/index?page=content& id=SB10296< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-9511.html" > https://linux.oracle.com/cve/CVE-2019-9511.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-5862.html" > https://linux.oracle.com/errata/ELSA-2020-5862.html< / a > < br > < a h
| libnghttp2-14 | CVE-2019-9513 | MEDIUM | 1.30.0-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2692" > https://access.redhat.com/errata/RHSA-2019:2692< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2745" > https://access.redhat.com/errata/RHSA-2019:2745< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2746" > https://access.redhat.com/errata/RHSA-2019:2746< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2775" > https://access.redhat.com/errata/RHSA-2019:2775< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2799" > https://access.redhat.com/errata/RHSA-2019:2799< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2925" > https://access.redhat.com/errata/RHSA-2019:2925< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2939" > https://access.redhat.com/errata/RHSA-2019:2939< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2949" > https://access.redhat.com/errata/RHSA-2019:2949< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2955" > https://access.redhat.com/errata/RHSA-2019:2955< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2966" > https://access.redhat.com/errata/RHSA-2019:2966< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3041" > https://access.redhat.com/errata/RHSA-2019:3041< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3932" > https://access.redhat.com/errata/RHSA-2019:3932< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3933" > https://access.redhat.com/errata/RHSA-2019:3933< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3935" > https://access.redhat.com/errata/RHSA-2019:3935< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-9513" > https://access.redhat.com/security/cve/CVE-2019-9513< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513< / a > < br > < a href = "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" > https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md< / a > < br > < a href = "https://kb.cert.org/vuls/id/605641/" > https://kb.cert.org/vuls/id/605641/< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10296" > https://kc.mcafee.com/corporate/index?page=content& id=SB10296< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-9513.html" > https://linux.oracle.com/cve/CVE-2019-9513.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-2925.html" > https://linux.oracle.com/errata/ELSA-2019-2925.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" > https://lists.fedoraproject.org/archives/l
| libnss3 | CVE-2017-11695 | LOW | 2:3.35-2ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html" > http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2017/Aug/17" > http://seclists.org/fulldisclosure/2017/Aug/17< / a > < br > < a href = "http://www.geeknik.net/9brdqk6xu" > http://www.geeknik.net/9brdqk6xu< / a > < br > < a href = "http://www.securityfocus.com/bid/100345" > http://www.securityfocus.com/bid/100345< / a > < br > < a href = "http://www.securitytracker.com/id/1039153" > http://www.securitytracker.com/id/1039153< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11695" > https://access.redhat.com/security/cve/CVE-2017-11695< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-37" > https://security.gentoo.org/glsa/202003-37< / a > < br > < / details > |
| libnss3 | CVE-2017-11696 | LOW | 2:3.35-2ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html" > http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2017/Aug/17" > http://seclists.org/fulldisclosure/2017/Aug/17< / a > < br > < a href = "http://www.geeknik.net/9brdqk6xu" > http://www.geeknik.net/9brdqk6xu< / a > < br > < a href = "http://www.securityfocus.com/bid/100345" > http://www.securityfocus.com/bid/100345< / a > < br > < a href = "http://www.securitytracker.com/id/1039153" > http://www.securitytracker.com/id/1039153< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11696" > https://access.redhat.com/security/cve/CVE-2017-11696< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-37" > https://security.gentoo.org/glsa/202003-37< / a > < br > < / details > |
| libnss3 | CVE-2017-11697 | LOW | 2:3.35-2ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html" > http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2017/Aug/17" > http://seclists.org/fulldisclosure/2017/Aug/17< / a > < br > < a href = "http://www.geeknik.net/9brdqk6xu" > http://www.geeknik.net/9brdqk6xu< / a > < br > < a href = "http://www.securityfocus.com/bid/100345" > http://www.securityfocus.com/bid/100345< / a > < br > < a href = "http://www.securitytracker.com/id/1039153" > http://www.securitytracker.com/id/1039153< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11697" > https://access.redhat.com/security/cve/CVE-2017-11697< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-37" > https://security.gentoo.org/glsa/202003-37< / a > < br > < / details > |
| libnss3 | CVE-2017-11698 | LOW | 2:3.35-2ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html" > http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2017/Aug/17" > http://seclists.org/fulldisclosure/2017/Aug/17< / a > < br > < a href = "http://www.geeknik.net/9brdqk6xu" > http://www.geeknik.net/9brdqk6xu< / a > < br > < a href = "http://www.securityfocus.com/bid/100345" > http://www.securityfocus.com/bid/100345< / a > < br > < a href = "http://www.securitytracker.com/id/1039153" > http://www.securitytracker.com/id/1039153< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11698" > https://access.redhat.com/security/cve/CVE-2017-11698< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-37" > https://security.gentoo.org/glsa/202003-37< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libnss3 | CVE-2020-25648 | LOW | 2:3.35-2ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-25648" > https://access.redhat.com/security/cve/CVE-2020-25648< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1887319" > https://bugzilla.redhat.com/show_bug.cgi?id=1887319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648< / a > < br > < a href = "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes" > https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-25648.html" > https://linux.oracle.com/cve/CVE-2020-25648.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3572.html" > https://linux.oracle.com/errata/ELSA-2021-3572.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libnss3 | CVE-2022-22747 | LOW | 2:3.35-2ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22747" > https://access.redhat.com/security/cve/CVE-2022-22747< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22747.html" > https://linux.oracle.com/cve/CVE-2022-22747.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0130.html" > https://linux.oracle.com/errata/ELSA-2022-0130.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5229-1" > https://ubuntu.com/security/notices/USN-5229-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5246-1" > https://ubuntu.com/security/notices/USN-5246-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5248-1" > https://ubuntu.com/security/notices/USN-5248-1< / a > < br > < a href = "https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/#CVE-2022-22747" > https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/#CVE-2022-22747< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libopenjp2-7 | CVE-2018-21010 | MEDIUM | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-21010" > https://access.redhat.com/security/cve/CVE-2018-21010< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea" > https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-29" > https://security.gentoo.org/glsa/202101-29< / a > < br > < / details > |
| libopenjp2-7 | CVE-2020-27814 | MEDIUM | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27814" > https://access.redhat.com/security/cve/CVE-2020-27814< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1901998" > https://bugzilla.redhat.com/show_bug.cgi?id=1901998< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/issues/1283" > https://github.com/uclouvain/openjpeg/issues/1283< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27814.html" > https://linux.oracle.com/cve/CVE-2020-27814.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4251.html" > https://linux.oracle.com/errata/ELSA-2021-4251.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-29" > https://security.gentoo.org/glsa/202101-29< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4685-1" > https://ubuntu.com/security/notices/USN-4685-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4686-1" > https://ubuntu.com/security/notices/USN-4686-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4880-1" > https://ubuntu.com/security/notices/USN-4880-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4882" > https://www.debian.org/security/2021/dsa-4882< / a > < br > < / details > |
| libopenjp2-7 | CVE-2020-27845 | MEDIUM | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27845" > https://access.redhat.com/security/cve/CVE-2020-27845< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1907523" > https://bugzilla.redhat.com/show_bug.cgi?id=1907523< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27845.html" > https://linux.oracle.com/cve/CVE-2020-27845.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4251.html" > https://linux.oracle.com/errata/ELSA-2021-4251.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-29" > https://security.gentoo.org/glsa/202101-29< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4685-1" > https://ubuntu.com/security/notices/USN-4685-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4686-1" > https://ubuntu.com/security/notices/USN-4686-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4880-1" > https://ubuntu.com/security/notices/USN-4880-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4882" > https://www.debian.org/security/2021/dsa-4882< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < / details > |
| libopenjp2-7 | CVE-2020-8112 | MEDIUM | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2020:0550" > https://access.redhat.com/errata/RHSA-2020:0550< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0569" > https://access.redhat.com/errata/RHSA-2020:0569< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0570" > https://access.redhat.com/errata/RHSA-2020:0570< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0694" > https://access.redhat.com/errata/RHSA-2020:0694< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-8112" > https://access.redhat.com/security/cve/CVE-2020-8112< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/issues/1231" > https://github.com/uclouvain/openjpeg/issues/1231< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-8112.html" > https://linux.oracle.com/cve/CVE-2020-8112.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-0570.html" > https://linux.oracle.com/errata/ELSA-2020-0570.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/01/msg00035.html" > https://lists.debian.org/debian-lts-announce/2020/01/msg00035.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" > https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM77GIFWHOECNIERYJQPI2ZJU57GZD5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM77GIFWHOECNIERYJQPI2ZJU57GZD5/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFEVEKETJV7GOXD5RDWL35ESEDHC663E/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFEVEKETJV7GOXD5RDWL35ESEDHC663E/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4686-1" > https://ubuntu.com/security/notices/USN-4686-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4882" > https://www.debian.org/security/2021/dsa-4882< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < / details > |
| libopenjp2-7 | CVE-2018-5727 | LOW | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5727" > https://access.redhat.com/security/cve/CVE-2018-5727< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/issues/1053" > https://github.com/uclouvain/openjpeg/issues/1053< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-5727.html" > https://linux.oracle.com/cve/CVE-2018-5727.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4251.html" > https://linux.oracle.com/errata/ELSA-2021-4251.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4686-1" > https://ubuntu.com/security/notices/USN-4686-1< / a > < br > < / details > |
| libopenjp2-7 | CVE-2019-12973 | LOW | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html< / a > < br > < a href = "http://www.securityfocus.com/bid/108900" > http://www.securityfocus.com/bid/108900< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-12973" > https://access.redhat.com/security/cve/CVE-2019-12973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3" > https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503" > https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-12973.html" > https://linux.oracle.com/cve/CVE-2019-12973.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4251.html" > https://linux.oracle.com/errata/ELSA-2021-4251.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" > https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-29" > https://security.gentoo.org/glsa/202101-29< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < / details > |
| libopenjp2-7 | CVE-2019-6988 | LOW | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/106785" > http://www.securityfocus.com/bid/106785< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-6988" > https://access.redhat.com/security/cve/CVE-2019-6988< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/issues/1178" > https://github.com/uclouvain/openjpeg/issues/1178< / a > < br > < / details > |
| libopenjp2-7 | CVE-2020-27841 | LOW | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27841" > https://access.redhat.com/security/cve/CVE-2020-27841< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1907510" > https://bugzilla.redhat.com/show_bug.cgi?id=1907510< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-29" > https://security.gentoo.org/glsa/202101-29< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4685-1" > https://ubuntu.com/security/notices/USN-4685-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4686-1" > https://ubuntu.com/security/notices/USN-4686-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4880-1" > https://ubuntu.com/security/notices/USN-4880-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4882" > https://www.debian.org/security/2021/dsa-4882< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < / details > |
2022-04-12 17:24:36 +00:00
| libopenjp2-7 | CVE-2021-29338 | LOW | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-29338" > https://access.redhat.com/security/cve/CVE-2021-29338< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/issues/1338" > https://github.com/uclouvain/openjpeg/issues/1338< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/pull/1346" > https://github.com/uclouvain/openjpeg/pull/1346< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/pull/1395" > https://github.com/uclouvain/openjpeg/pull/1395< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/pull/1396" > https://github.com/uclouvain/openjpeg/pull/1396< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/pull/1397" > https://github.com/uclouvain/openjpeg/pull/1397< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/pull/1398" > https://github.com/uclouvain/openjpeg/pull/1398< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-29338.html" > https://linux.oracle.com/cve/CVE-2021-29338.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4251.html" > https://linux.oracle.com/errata/ELSA-2021-4251.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libopenjp2-7 | CVE-2021-3575 | LOW | 2.3.0-2build0.18.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3575" > https://access.redhat.com/security/cve/CVE-2021-3575< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1957616" > https://bugzilla.redhat.com/show_bug.cgi?id=1957616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575< / a > < br > < a href = "https://github.com/uclouvain/openjpeg/issues/1347" > https://github.com/uclouvain/openjpeg/issues/1347< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3575.html" > https://linux.oracle.com/cve/CVE-2021-3575.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4251.html" > https://linux.oracle.com/errata/ELSA-2021-4251.html< / a > < br > < a href = "https://ubuntu.com/security/CVE-2021-3575" > https://ubuntu.com/security/CVE-2021-3575< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libopenmpt0 | CVE-2018-11710 | MEDIUM | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11710" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11710< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2018/04/29/security-updates-0.3.9-0.2-beta32-0.2.7561-beta20.5-p9-0.2.7386-beta20.3-p12/" > https://lib.openmpt.org/libopenmpt/2018/04/29/security-updates-0.3.9-0.2-beta32-0.2.7561-beta20.5-p9-0.2.7386-beta20.3-p12/< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=10149&peg=10150" > https://source.openmpt.org/browse/openmpt/trunk/?op=revision& rev=10149& peg=10150< / a > < br > < / details > |
| libopenmpt0 | CVE-2018-20861 | MEDIUM | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20861" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20861< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/" > https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=10615" > https://source.openmpt.org/browse/openmpt/trunk/?op=revision& rev=10615< / a > < br > < / details > |
| libopenmpt0 | CVE-2019-14383 | MEDIUM | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14383" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14383< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/" > https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=11216" > https://source.openmpt.org/browse/openmpt/trunk/?op=revision& rev=11216< / a > < br > < / details > |
| libopenmpt0 | CVE-2019-17113 | MEDIUM | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00035.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00035.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00044.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00044.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17113" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17113< / a > < br > < a href = "https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe" > https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe< / a > < br > < a href = "https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.3.18...libopenmpt-0.3.19" > https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.3.18...libopenmpt-0.3.19< / a > < br > < a href = "https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.4.8...libopenmpt-0.4.9" > https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.4.8...libopenmpt-0.4.9< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/08/msg00003.html" > https://lists.debian.org/debian-lts-announce/2020/08/msg00003.html< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/OpenMPT/?op=revision&rev=12127&peg=12127" > https://source.openmpt.org/browse/openmpt/trunk/OpenMPT/?op=revision& rev=12127& peg=12127< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4729" > https://www.debian.org/security/2020/dsa-4729< / a > < br > < / details > |
| libopenmpt0 | CVE-2018-10017 | LOW | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10017< / a > < br > < a href = "https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76" > https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76< / a > < br > < a href = "https://github.com/OpenMPT/openmpt/commit/7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c" > https://github.com/OpenMPT/openmpt/commit/7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2018/04/08/security-updates-0.3.8-0.2-beta31-0.2.7561-beta20.5-p8-0.2.7386-beta20.3-p11/" > https://lib.openmpt.org/libopenmpt/2018/04/08/security-updates-0.3.8-0.2-beta31-0.2.7561-beta20.5-p8-0.2.7386-beta20.3-p11/< / a > < br > < a href = "https://openmpt.org/openmpt-1-27-07-00-released" > https://openmpt.org/openmpt-1-27-07-00-released< / a > < br > < / details > |
| libopenmpt0 | CVE-2018-20860 | LOW | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20860" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20860< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/" > https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=10903" > https://source.openmpt.org/browse/openmpt/trunk/?op=revision& rev=10903< / a > < br > < / details > |
| libopenmpt0 | CVE-2019-14380 | LOW | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14380< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2019/05/27/security-update-0.4.5/" > https://lib.openmpt.org/libopenmpt/2019/05/27/security-update-0.4.5/< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=11608" > https://source.openmpt.org/browse/openmpt/trunk/?op=revision& rev=11608< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4729" > https://www.debian.org/security/2020/dsa-4729< / a > < br > < / details > |
| libopenmpt0 | CVE-2019-14382 | LOW | 0.3.6-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14382< / a > < br > < a href = "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/" > https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/< / a > < br > < a href = "https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=11209" > https://source.openmpt.org/browse/openmpt/trunk/?op=revision& rev=11209< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-9 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-9 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20838" > https://access.redhat.com/security/cve/CVE-2019-20838< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20838.html" > https://linux.oracle.com/cve/CVE-2019-20838.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20838" > https://nvd.nist.gov/vuln/detail/CVE-2019-20838< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/" > https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14155" > https://access.redhat.com/security/cve/CVE-2020-14155< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-14155.html" > https://linux.oracle.com/cve/CVE-2020-14155.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14155" > https://nvd.nist.gov/vuln/detail/CVE-2020-14155< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libpng16-16 | CVE-2018-14048 | LOW | 1.6.34-1ubuntu0.18.04.2 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html" > http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html< / a > < br > < a href = "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" > http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-14048" > https://access.redhat.com/security/cve/CVE-2018-14048< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048< / a > < br > < a href = "https://github.com/fouzhe/security/tree/master/libpng" > https://github.com/fouzhe/security/tree/master/libpng< / a > < br > < a href = "https://github.com/glennrp/libpng/issues/238" > https://github.com/glennrp/libpng/issues/238< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Apr/30" > https://seclists.org/bugtraq/2019/Apr/30< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-02" > https://security.gentoo.org/glsa/201908-02< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libpostproc54 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libpostproc54 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libpostproc54 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libpostproc54 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libpostproc54 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libpostproc54 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libpostproc54 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libpostproc54 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libpostproc54 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libpostproc54 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libpostproc54 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libpostproc54 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| librsvg2-2 | CVE-2019-20446 | LOW | 2.40.20-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html" > http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20446" > https://access.redhat.com/security/cve/CVE-2019-20446< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/librsvg/issues/515" > https://gitlab.gnome.org/GNOME/librsvg/issues/515< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20446.html" > https://linux.oracle.com/cve/CVE-2019-20446.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4709.html" > https://linux.oracle.com/errata/ELSA-2020-4709.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html" > https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4436-1" > https://ubuntu.com/security/notices/USN-4436-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4436-2" > https://ubuntu.com/security/notices/USN-4436-2< / a > < br > < a href = "https://usn.ubuntu.com/4436-1/" > https://usn.ubuntu.com/4436-1/< / a > < br > < / details > |
| librsvg2-common | CVE-2019-20446 | LOW | 2.40.20-2ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html" > http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20446" > https://access.redhat.com/security/cve/CVE-2019-20446< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/librsvg/issues/515" > https://gitlab.gnome.org/GNOME/librsvg/issues/515< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20446.html" > https://linux.oracle.com/cve/CVE-2019-20446.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4709.html" > https://linux.oracle.com/errata/ELSA-2020-4709.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html" > https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4436-1" > https://ubuntu.com/security/notices/USN-4436-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4436-2" > https://ubuntu.com/security/notices/USN-4436-2< / a > < br > < a href = "https://usn.ubuntu.com/4436-1/" > https://usn.ubuntu.com/4436-1/< / a > < br > < / details > |
| libsasl2-2 | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3ubuntu2.3 | 2.1.27~101-g0780600+dfsg-3ubuntu2.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/23/4" > http://www.openwall.com/lists/oss-security/2022/02/23/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-24407" > https://access.redhat.com/security/cve/CVE-2022-24407< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407< / a > < br > < a href = "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst" > https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-24407.html" > https://linux.oracle.com/cve/CVE-2022-24407.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9239.html" > https://linux.oracle.com/errata/ELSA-2022-9239.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24407" > https://nvd.nist.gov/vuln/detail/CVE-2022-24407< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5301-1" > https://ubuntu.com/security/notices/USN-5301-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5301-2" > https://ubuntu.com/security/notices/USN-5301-2< / a > < br > < a href = "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28" > https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5087" > https://www.debian.org/security/2022/dsa-5087< / a > < br > < / details > |
| libsasl2-modules | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3ubuntu2.3 | 2.1.27~101-g0780600+dfsg-3ubuntu2.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/23/4" > http://www.openwall.com/lists/oss-security/2022/02/23/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-24407" > https://access.redhat.com/security/cve/CVE-2022-24407< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407< / a > < br > < a href = "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst" > https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-24407.html" > https://linux.oracle.com/cve/CVE-2022-24407.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9239.html" > https://linux.oracle.com/errata/ELSA-2022-9239.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24407" > https://nvd.nist.gov/vuln/detail/CVE-2022-24407< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5301-1" > https://ubuntu.com/security/notices/USN-5301-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5301-2" > https://ubuntu.com/security/notices/USN-5301-2< / a > < br > < a href = "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28" > https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5087" > https://www.debian.org/security/2022/dsa-5087< / a > < br > < / details > |
| libsasl2-modules-db | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3ubuntu2.3 | 2.1.27~101-g0780600+dfsg-3ubuntu2.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/23/4" > http://www.openwall.com/lists/oss-security/2022/02/23/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-24407" > https://access.redhat.com/security/cve/CVE-2022-24407< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407< / a > < br > < a href = "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst" > https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-24407.html" > https://linux.oracle.com/cve/CVE-2022-24407.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9239.html" > https://linux.oracle.com/errata/ELSA-2022-9239.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24407" > https://nvd.nist.gov/vuln/detail/CVE-2022-24407< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5301-1" > https://ubuntu.com/security/notices/USN-5301-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5301-2" > https://ubuntu.com/security/notices/USN-5301-2< / a > < br > < a href = "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28" > https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5087" > https://www.debian.org/security/2022/dsa-5087< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-13626 | MEDIUM | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-13626" > https://access.redhat.com/security/cve/CVE-2019-13626< / a > < br > < a href = "https://bugzilla-attachments.libsdl.org/attachment.cgi?id=3610" > https://bugzilla-attachments.libsdl.org/attachment.cgi?id=3610< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4522" > https://bugzilla.libsdl.org/show_bug.cgi?id=4522< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13626< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libsdl2-2.0-0 | CVE-2020-14409 | MEDIUM | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-14409" > https://access.redhat.com/security/cve/CVE-2020-14409< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=5200" > https://bugzilla.libsdl.org/show_bug.cgi?id=5200< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14409" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14409< / a > < br > < a href = "https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9" > https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-55" > https://security.gentoo.org/glsa/202107-55< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2020-14410 | MEDIUM | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-14410" > https://access.redhat.com/security/cve/CVE-2020-14410< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=5200" > https://bugzilla.libsdl.org/show_bug.cgi?id=5200< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14410" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14410< / a > < br > < a href = "https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9" > https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-55" > https://security.gentoo.org/glsa/202107-55< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libsdl2-2.0-0 | CVE-2021-33657 | MEDIUM | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33657" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33657< / a > < br > < a href = "https://github.com/libsdl-org/SDL/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9" > https://github.com/libsdl-org/SDL/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9< / a > < br > < a href = "https://github.com/libsdl-org/SDL/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9 (release-2.0.20)" > https://github.com/libsdl-org/SDL/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9 (release-2.0.20)< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libsdl2-2.0-0 | CVE-2019-13616 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3950" > https://access.redhat.com/errata/RHSA-2019:3950< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3951" > https://access.redhat.com/errata/RHSA-2019:3951< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0293" > https://access.redhat.com/errata/RHSA-2020:0293< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-13616" > https://access.redhat.com/security/cve/CVE-2019-13616< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4538" > https://bugzilla.libsdl.org/show_bug.cgi?id=4538< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13616.html" > https://linux.oracle.com/cve/CVE-2019-13616.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-4024.html" > https://linux.oracle.com/errata/ELSA-2019-4024.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEH5RO7XZA5DDCO2XOP4QHDEELQQTYV2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEH5RO7XZA5DDCO2XOP4QHDEELQQTYV2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDNX3RVXTWELBXQDNERNVVKDGKDF2MPB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDNX3RVXTWELBXQDNERNVVKDGKDF2MPB/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4238-1" > https://ubuntu.com/security/notices/USN-4238-1< / a > < b
| libsdl2-2.0-0 | CVE-2019-7572 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7572" > https://access.redhat.com/security/cve/CVE-2019-7572< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4495" > https://bugzilla.libsdl.org/show_bug.cgi?id=4495< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7572.html" > https://linux.oracle.com/cve/CVE-2019-7572.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-7573 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7573" > https://access.redhat.com/security/cve/CVE-2019-7573< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4491" > https://bugzilla.libsdl.org/show_bug.cgi?id=4491< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7573.html" > https://linux.oracle.com/cve/CVE-2019-7573.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-7574 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7574" > https://access.redhat.com/security/cve/CVE-2019-7574< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4496" > https://bugzilla.libsdl.org/show_bug.cgi?id=4496< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7574.html" > https://linux.oracle.com/cve/CVE-2019-7574.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-7575 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7575" > https://access.redhat.com/security/cve/CVE-2019-7575< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4493" > https://bugzilla.libsdl.org/show_bug.cgi?id=4493< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7575.html" > https://linux.oracle.com/cve/CVE-2019-7575.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-7576 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7576" > https://access.redhat.com/security/cve/CVE-2019-7576< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4490" > https://bugzilla.libsdl.org/show_bug.cgi?id=4490< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7576.html" > https://linux.oracle.com/cve/CVE-2019-7576.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-7577 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7577" > https://access.redhat.com/security/cve/CVE-2019-7577< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4492" > https://bugzilla.libsdl.org/show_bug.cgi?id=4492< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7577.html" > https://linux.oracle.com/cve/CVE-2019-7577.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MD6EIV2CS6QNDU3UN2RVXPQOFQNHXCP7/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MD6EIV2CS6QNDU3UN2RVXPQOFQNHXCP7/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFYUCO6D5APPM7IOZ5WOCYVY4DKSXFKD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFYUCO6D5APPM7IOZ5WOCYVY4DKSXFKD/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsdl2-2.0-0 | CVE-2019-7578 | LOW | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-7578" > https://access.redhat.com/security/cve/CVE-2019-7578< / a > < br > < a href = "https://bugzilla.libsdl.org/show_bug.cgi?id=4494" > https://bugzilla.libsdl.org/show_bug.cgi?id=4494< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578< / a > < br > < a href = "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720" > https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-7578.html" > https://linux.oracle.com/cve/CVE-2019-7578.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4627.html" > https://linux.oracle.com/errata/ELSA-2020-4627.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html" > https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/< / a > < br > < a href = "https://security.gentoo.org/glsa/201909-07" > https://security.gentoo.org/glsa/201909-07< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-1" > https://ubuntu.com/security/notices/USN-4156-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4156-2" > https://ubuntu.com/security/notices/USN-4156-2< / a > < br > < a href = "https://usn.ubuntu.com/4156-1/" > https://usn.ubuntu.com/4156-1/< / a > < br > < a href = "https://usn.ubuntu.com/4156-2/" > https://usn.ubuntu.com/4156-2/< / a > < br > < / details > |
| libsepol1 | CVE-2021-36084 | LOW | 2.7-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36084" > https://access.redhat.com/security/cve/CVE-2021-36084< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3" > https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36084.html" > https://linux.oracle.com/cve/CVE-2021-36084.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < / details > |
| libsepol1 | CVE-2021-36085 | LOW | 2.7-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36085" > https://access.redhat.com/security/cve/CVE-2021-36085< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba" > https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36085.html" > https://linux.oracle.com/cve/CVE-2021-36085.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < / details > |
| libsepol1 | CVE-2021-36086 | LOW | 2.7-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36086" > https://access.redhat.com/security/cve/CVE-2021-36086< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8" > https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36086.html" > https://linux.oracle.com/cve/CVE-2021-36086.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < / details > |
| libsepol1 | CVE-2021-36087 | LOW | 2.7-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36087" > https://access.redhat.com/security/cve/CVE-2021-36087< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521" > https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36087.html" > https://linux.oracle.com/cve/CVE-2021-36087.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/" > https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/< / a > < br > < / details > |
| libspeex1 | CVE-2020-23903 | MEDIUM | 1.2~rc1.2-1ubuntu2 | 1.2~rc1.2-1ubuntu2.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-23903" > https://access.redhat.com/security/cve/CVE-2020-23903< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23903" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23903< / a > < br > < a href = "https://github.com/xiph/speex/issues/13" > https://github.com/xiph/speex/issues/13< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5280-1" > https://ubuntu.com/security/notices/USN-5280-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/HT211168" > https://support.apple.com/HT211168< / a > < br > < a href = "https://support.apple.com/HT211170" > https://support.apple.com/HT211170< / a > < br > < a href = "https://support.apple.com/HT211171" > https://support.apple.com/HT211171< / a > < br > < a href = "https://support.apple.com/HT211175" > https://support.apple.com/HT211175< / a > < br > < a href = "https://support.apple.com/HT211178" > https://support.apple.com/HT211178< / a > < br > < a href = "https://support.apple.com/HT211179" > https://support.apple.com/HT211179< / a > < br > < a href = "https://support.apple.com/HT211181" > https://support.apple.com/HT211181< / a > < br > < a href = "https://vuldb.com/?id.155768" > https://vuldb.com/?id.155768< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/en-us/HT211935" > https://support.apple.com/en-us/HT211935< / a > < br > < a href = "https://support.apple.com/en-us/HT211952" > https://support.apple.com/en-us/HT211952< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211847" > https://support.apple.com/en-us/HT211847< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211846" > https://support.apple.com/kb/HT211846< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libsqlite3-0 | CVE-2021-36690 | LOW | 3.22.0-1ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36690" > https://nvd.nist.gov/vuln/detail/CVE-2021-36690< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.sqlite.org/forum/forumpost/718c0a8d17" > https://www.sqlite.org/forum/forumpost/718c0a8d17< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libss2 | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1-1ubuntu2.1~18.04.13 | 1.1.1-1ubuntu2.1~18.04.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9272.html" > https://linux.oracle.com/errata/ELSA-2022-9272.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-07" > https://www.tenable.com/security/tns-2022-07< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-08" > https://www.tenable.com/security/tns-2022-08< / a > < br > < a
2022-03-30 20:23:21 +00:00
| libstdc++6 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" > http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13844" > https://access.redhat.com/security/cve/CVE-2020-13844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation< / a > < br > < a href = "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" > https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions< / a > < br > < a href = "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" > https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html< / a > < br > < a href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8" > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libswresample2 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libswresample2 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libswresample2 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libswresample2 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libswresample2 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libswresample2 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libswresample2 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libswresample2 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libswresample2 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libswresample2 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libswresample2 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libswresample2 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libswresample2 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswresample2 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libswresample2 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswresample2 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libswresample2 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libswresample2 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libswscale4 | CVE-2020-20891 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8282" > https://trac.ffmpeg.org/ticket/8282< / a > < br > < / details > |
| libswscale4 | CVE-2020-20892 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01" > http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8265" > https://trac.ffmpeg.org/ticket/8265< / a > < br > < / details > |
| libswscale4 | CVE-2020-20896 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896< / a > < br > < a href = "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b" > https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8273" > https://trac.ffmpeg.org/ticket/8273< / a > < br > < / details > |
| libswscale4 | CVE-2020-21041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7989" > https://trac.ffmpeg.org/ticket/7989< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-21688 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8186" > https://trac.ffmpeg.org/ticket/8186< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-21697 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8188" > https://trac.ffmpeg.org/ticket/8188< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-22015 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8190" > https://trac.ffmpeg.org/ticket/8190< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22016 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22016< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8183" > https://trac.ffmpeg.org/ticket/8183< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22017 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22017< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8309" > https://trac.ffmpeg.org/ticket/8309< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22019 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8241" > https://trac.ffmpeg.org/ticket/8241< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22020 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22020< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8239" > https://trac.ffmpeg.org/ticket/8239< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22021 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8240" > https://trac.ffmpeg.org/ticket/8240< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22022 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22022< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8264" > https://trac.ffmpeg.org/ticket/8264< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22023 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8244" > https://trac.ffmpeg.org/ticket/8244< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22025 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22025< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8260" > https://trac.ffmpeg.org/ticket/8260< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22026 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22026< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8317" > https://trac.ffmpeg.org/ticket/8317< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22028 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22028< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8274" > https://trac.ffmpeg.org/ticket/8274< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22031 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22031< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191" > https://trac.ffmpeg.org/attachment/ticket/8243/gdb-vf_w3fdif_191< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8243" > https://trac.ffmpeg.org/ticket/8243< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22032 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22032< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8275" > https://trac.ffmpeg.org/ticket/8275< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22033 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22033< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8246" > https://trac.ffmpeg.org/ticket/8246< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22034 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22034< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8236" > https://trac.ffmpeg.org/ticket/8236< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22036 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22036< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8261" > https://trac.ffmpeg.org/ticket/8261< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2020-22037 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8281" > https://trac.ffmpeg.org/ticket/8281< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-22038 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8285" > https://trac.ffmpeg.org/ticket/8285< / a > < br > < / details > |
| libswscale4 | CVE-2020-22039 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8302" > https://trac.ffmpeg.org/ticket/8302< / a > < br > < / details > |
| libswscale4 | CVE-2020-22040 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8283" > https://trac.ffmpeg.org/ticket/8283< / a > < br > < / details > |
| libswscale4 | CVE-2020-22041 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8296" > https://trac.ffmpeg.org/ticket/8296< / a > < br > < / details > |
| libswscale4 | CVE-2020-22042 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8267" > https://trac.ffmpeg.org/ticket/8267< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-22043 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8284" > https://trac.ffmpeg.org/ticket/8284< / a > < br > < / details > |
| libswscale4 | CVE-2020-22044 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8295" > https://trac.ffmpeg.org/ticket/8295< / a > < br > < / details > |
| libswscale4 | CVE-2020-22046 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8294" > https://trac.ffmpeg.org/ticket/8294< / a > < br > < / details > |
| libswscale4 | CVE-2020-22048 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8303" > https://trac.ffmpeg.org/ticket/8303< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| libswscale4 | CVE-2020-22051 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8313" > https://trac.ffmpeg.org/ticket/8313< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libswscale4 | CVE-2020-35965 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26532< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35965< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b" > https://github.com/FFmpeg/FFmpeg/commit/3e5959b3457f7f1856d997261e6ac672bba49e8b< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3" > https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-24" > https://security.gentoo.org/glsa/202105-24< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < / details > |
| libswscale4 | CVE-2021-3566 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f" > https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < / details > |
| libswscale4 | CVE-2021-38114 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1" > https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2021-38171 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171< / a > < br > < a href = "https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6" > https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/" > https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2021-38291 | MEDIUM | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/9312" > https://trac.ffmpeg.org/ticket/9312< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-20445 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7996" > https://trac.ffmpeg.org/ticket/7996< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-20446 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/7995" > https://trac.ffmpeg.org/ticket/7995< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
| libswscale4 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451< / a > < br > < a href = "https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb" > https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8094" > https://trac.ffmpeg.org/ticket/8094< / a > < br > < / details > |
| libswscale4 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8003" > https://trac.ffmpeg.org/ticket/8003< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4990" > https://www.debian.org/security/2021/dsa-4990< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4998" > https://www.debian.org/security/2021/dsa-4998< / a > < br > < / details > |
2022-02-05 12:54:37 +00:00
| libswscale4 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad" > http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902< / a > < br > < a href = "https://trac.ffmpeg.org/ticket/8176" > https://trac.ffmpeg.org/ticket/8176< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libtiff5 | CVE-2022-0865 | MEDIUM | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0865" > https://access.redhat.com/security/cve/CVE-2022-0865< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865< / a > < br > < a href = "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json" > https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067" > https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/385" > https://gitlab.com/libtiff/libtiff/-/issues/385< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/merge_requests/306" > https://gitlab.com/libtiff/libtiff/-/merge_requests/306< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0865" > https://nvd.nist.gov/vuln/detail/CVE-2022-0865< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5108" > https://www.debian.org/security/2022/dsa-5108< / a > < br > < / details > |
| libtiff5 | CVE-2022-0891 | MEDIUM | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0891" > https://access.redhat.com/security/cve/CVE-2022-0891< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891< / a > < br > < a href = "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c" > https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c< / a > < br > < a href = "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json" > https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c" > https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/380" > https://gitlab.com/libtiff/libtiff/-/issues/380< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/382" > https://gitlab.com/libtiff/libtiff/-/issues/382< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0891" > https://nvd.nist.gov/vuln/detail/CVE-2022-0891< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5108" > https://www.debian.org/security/2022/dsa-5108< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libtiff5 | CVE-2018-10126 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.maptools.org/show_bug.cgi?id=2786" > http://bugzilla.maptools.org/show_bug.cgi?id=2786< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10126" > https://access.redhat.com/security/cve/CVE-2018-10126< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libtiff5 | CVE-2020-19131 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/" > http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/< / a > < br > < a href = "http://bugzilla.maptools.org/show_bug.cgi?id=2831" > http://bugzilla.maptools.org/show_bug.cgi?id=2831< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-19131" > https://access.redhat.com/security/cve/CVE-2020-19131< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html< / a > < br > < / details > |
| libtiff5 | CVE-2020-19144 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.maptools.org/show_bug.cgi?id=2852" > http://bugzilla.maptools.org/show_bug.cgi?id=2852< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-19144" > https://access.redhat.com/security/cve/CVE-2020-19144< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/159" > https://gitlab.com/libtiff/libtiff/-/issues/159< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211004-0005/" > https://security.netapp.com/advisory/ntap-20211004-0005/< / a > < br > < / details > |
| libtiff5 | CVE-2020-35522 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-35522" > https://access.redhat.com/security/cve/CVE-2020-35522< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1932037" > https://bugzilla.redhat.com/show_bug.cgi?id=1932037< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/merge_requests/165" > https://gitlab.com/libtiff/libtiff/-/merge_requests/165< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-35522.html" > https://linux.oracle.com/cve/CVE-2020-35522.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4241.html" > https://linux.oracle.com/errata/ELSA-2021-4241.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-35522" > https://nvd.nist.gov/vuln/detail/CVE-2020-35522< / a > < br > < a href = "https://security.gentoo.org/glsa/202104-06" > https://security.gentoo.org/glsa/202104-06< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210521-0009/" > https://security.netapp.com/advisory/ntap-20210521-0009/< / a > < br > < / details > |
| libtiff5 | CVE-2022-0561 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0561" > https://access.redhat.com/security/cve/CVE-2022-0561< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561< / a > < br > < a href = "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef" > https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef< / a > < br > < a href = "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json" > https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/362" > https://gitlab.com/libtiff/libtiff/-/issues/362< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0561" > https://nvd.nist.gov/vuln/detail/CVE-2022-0561< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220318-0001/" > https://security.netapp.com/advisory/ntap-20220318-0001/< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5108" > https://www.debian.org/security/2022/dsa-5108< / a > < br > < / details > |
| libtiff5 | CVE-2022-0562 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0562" > https://access.redhat.com/security/cve/CVE-2022-0562< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562< / a > < br > < a href = "https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b" > https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b< / a > < br > < a href = "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json" > https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/362" > https://gitlab.com/libtiff/libtiff/-/issues/362< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0562" > https://nvd.nist.gov/vuln/detail/CVE-2022-0562< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220318-0001/" > https://security.netapp.com/advisory/ntap-20220318-0001/< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5108" > https://www.debian.org/security/2022/dsa-5108< / a > < br > < / details > |
| libtiff5 | CVE-2022-22844 | LOW | 4.0.9-5ubuntu0.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22844" > https://access.redhat.com/security/cve/CVE-2022-22844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/issues/355" > https://gitlab.com/libtiff/libtiff/-/issues/355< / a > < br > < a href = "https://gitlab.com/libtiff/libtiff/-/merge_requests/287" > https://gitlab.com/libtiff/libtiff/-/merge_requests/287< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22844" > https://nvd.nist.gov/vuln/detail/CVE-2022-22844< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220311-0002/" > https://security.netapp.com/advisory/ntap-20220311-0002/< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5108" > https://www.debian.org/security/2022/dsa-5108< / a > < br > < / details > |
| libtinfo5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17594" > https://access.redhat.com/security/cve/CVE-2019-17594< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libtinfo5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17595" > https://access.redhat.com/security/cve/CVE-2019-17595< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| libvorbis0a | CVE-2017-14160 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/09/21/2" > http://openwall.com/lists/oss-security/2017/09/21/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/09/21/2" > http://www.openwall.com/lists/oss-security/2017/09/21/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/09/21/3" > http://www.openwall.com/lists/oss-security/2017/09/21/3< / a > < br > < a href = "http://www.securityfocus.com/bid/101045" > http://www.securityfocus.com/bid/101045< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-14160" > https://access.redhat.com/security/cve/CVE-2017-14160< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbis0a | CVE-2018-10392 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3703" > https://access.redhat.com/errata/RHSA-2019:3703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10392" > https://access.redhat.com/security/cve/CVE-2018-10392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392< / a > < br > < a href = "https://gitlab.xiph.org/xiph/vorbis/issues/2335" > https://gitlab.xiph.org/xiph/vorbis/issues/2335< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-10392.html" > https://linux.oracle.com/cve/CVE-2018-10392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3703.html" > https://linux.oracle.com/errata/ELSA-2019-3703.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-10392" > https://nvd.nist.gov/vuln/detail/CVE-2018-10392< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbis0a | CVE-2018-10393 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3703" > https://access.redhat.com/errata/RHSA-2019:3703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10393" > https://access.redhat.com/security/cve/CVE-2018-10393< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393< / a > < br > < a href = "https://gitlab.xiph.org/xiph/vorbis/issues/2334" > https://gitlab.xiph.org/xiph/vorbis/issues/2334< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-10393.html" > https://linux.oracle.com/cve/CVE-2018-10393.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3703.html" > https://linux.oracle.com/errata/ELSA-2019-3703.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-10393" > https://nvd.nist.gov/vuln/detail/CVE-2018-10393< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbisenc2 | CVE-2017-14160 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/09/21/2" > http://openwall.com/lists/oss-security/2017/09/21/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/09/21/2" > http://www.openwall.com/lists/oss-security/2017/09/21/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/09/21/3" > http://www.openwall.com/lists/oss-security/2017/09/21/3< / a > < br > < a href = "http://www.securityfocus.com/bid/101045" > http://www.securityfocus.com/bid/101045< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-14160" > https://access.redhat.com/security/cve/CVE-2017-14160< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbisenc2 | CVE-2018-10392 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3703" > https://access.redhat.com/errata/RHSA-2019:3703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10392" > https://access.redhat.com/security/cve/CVE-2018-10392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392< / a > < br > < a href = "https://gitlab.xiph.org/xiph/vorbis/issues/2335" > https://gitlab.xiph.org/xiph/vorbis/issues/2335< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-10392.html" > https://linux.oracle.com/cve/CVE-2018-10392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3703.html" > https://linux.oracle.com/errata/ELSA-2019-3703.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-10392" > https://nvd.nist.gov/vuln/detail/CVE-2018-10392< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbisenc2 | CVE-2018-10393 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3703" > https://access.redhat.com/errata/RHSA-2019:3703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10393" > https://access.redhat.com/security/cve/CVE-2018-10393< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393< / a > < br > < a href = "https://gitlab.xiph.org/xiph/vorbis/issues/2334" > https://gitlab.xiph.org/xiph/vorbis/issues/2334< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-10393.html" > https://linux.oracle.com/cve/CVE-2018-10393.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3703.html" > https://linux.oracle.com/errata/ELSA-2019-3703.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-10393" > https://nvd.nist.gov/vuln/detail/CVE-2018-10393< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbisfile3 | CVE-2017-14160 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/09/21/2" > http://openwall.com/lists/oss-security/2017/09/21/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/09/21/2" > http://www.openwall.com/lists/oss-security/2017/09/21/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/09/21/3" > http://www.openwall.com/lists/oss-security/2017/09/21/3< / a > < br > < a href = "http://www.securityfocus.com/bid/101045" > http://www.securityfocus.com/bid/101045< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-14160" > https://access.redhat.com/security/cve/CVE-2017-14160< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbisfile3 | CVE-2018-10392 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3703" > https://access.redhat.com/errata/RHSA-2019:3703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10392" > https://access.redhat.com/security/cve/CVE-2018-10392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392< / a > < br > < a href = "https://gitlab.xiph.org/xiph/vorbis/issues/2335" > https://gitlab.xiph.org/xiph/vorbis/issues/2335< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-10392.html" > https://linux.oracle.com/cve/CVE-2018-10392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3703.html" > https://linux.oracle.com/errata/ELSA-2019-3703.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-10392" > https://nvd.nist.gov/vuln/detail/CVE-2018-10392< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
| libvorbisfile3 | CVE-2018-10393 | LOW | 1.3.5-4.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3703" > https://access.redhat.com/errata/RHSA-2019:3703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-10393" > https://access.redhat.com/security/cve/CVE-2018-10393< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393< / a > < br > < a href = "https://gitlab.xiph.org/xiph/vorbis/issues/2334" > https://gitlab.xiph.org/xiph/vorbis/issues/2334< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-10393.html" > https://linux.oracle.com/cve/CVE-2018-10393.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3703.html" > https://linux.oracle.com/errata/ELSA-2019-3703.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html" > https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-10393" > https://nvd.nist.gov/vuln/detail/CVE-2018-10393< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-36" > https://security.gentoo.org/glsa/202003-36< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| libwind0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" > http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html< / a > < br > < a href = "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" > http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" > https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf< / a > < br > < a href = "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" > https://github.com/heimdal/heimdal/compare/3e58559...bbafe72< / a > < br > < a href = "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" > https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/< / a > < br > < a href = "https://seclists.org/bugtraq/2019/Jun/1" > https://seclists.org/bugtraq/2019/Jun/1< / a > < br > < a href = "https://www.debian.org/security/2019/dsa-4455" > https://www.debian.org/security/2019/dsa-4455< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
2022-04-12 17:24:36 +00:00
| libxml2 | CVE-2022-23308 | MEDIUM | 2.9.4+dfsg1-6.1ubuntu1.4 | 2.9.4+dfsg1-6.1ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23308" > https://access.redhat.com/security/cve/CVE-2022-23308< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308< / a > < br > < a href = "https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e" > https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS" > https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23308.html" > https://linux.oracle.com/cve/CVE-2022-23308.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0899.html" > https://linux.oracle.com/errata/ELSA-2022-0899.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" > https://nvd.nist.gov/vuln/detail/CVE-2022-23308< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0008/" > https://security.netapp.com/advisory/ntap-20220331-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5324-1" > https://ubuntu.com/security/notices/USN-5324-1< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libzmq5 | CVE-2020-15166 | MEDIUM | 4.2.5-1ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-15166" > https://access.redhat.com/security/cve/CVE-2020-15166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166< / a > < br > < a href = "https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09" > https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09< / a > < br > < a href = "https://github.com/zeromq/libzmq/pull/3913" > https://github.com/zeromq/libzmq/pull/3913< / a > < br > < a href = "https://github.com/zeromq/libzmq/pull/3973" > https://github.com/zeromq/libzmq/pull/3973< / a > < br > < a href = "https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m" > https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html" > https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/< / a > < br > < a href = "https://security.gentoo.org/glsa/202009-12" > https://security.gentoo.org/glsa/202009-12< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2020/09/07/3" > https://www.openwall.com/lists/oss-security/2020/09/07/3< / a > < br > < / details > |
| libzmq5 | CVE-2021-20235 | MEDIUM | 4.2.5-1ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-20235" > https://access.redhat.com/security/cve/CVE-2021-20235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1921983" > https://bugzilla.redhat.com/show_bug.cgi?id=1921983< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235< / a > < br > < a href = "https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6" > https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6< / a > < br > < / details > |
| libzmq5 | CVE-2021-20236 | MEDIUM | 4.2.5-1ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-20236" > https://access.redhat.com/security/cve/CVE-2021-20236< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1921976" > https://bugzilla.redhat.com/show_bug.cgi?id=1921976< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236< / a > < br > < a href = "https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8" > https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-20236" > https://nvd.nist.gov/vuln/detail/CVE-2021-20236< / a > < br > < / details > |
| locales | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| locales | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2009-5155" > https://access.redhat.com/security/cve/CVE-2009-5155< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| locales | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-8985" > https://access.redhat.com/security/cve/CVE-2015-8985< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| locales | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10228" > https://access.redhat.com/security/cve/CVE-2016-10228< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| locales | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10739" > https://access.redhat.com/security/cve/CVE-2016-10739< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" > https://nvd.nist.gov/vuln/detail/CVE-2016-10739< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| locales | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-25013" > https://access.redhat.com/security/cve/CVE-2019-25013< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-25013" > https://nvd.nist.gov/vuln/detail/CVE-2019-25013< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=comm
| locales | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27618" > https://access.redhat.com/security/cve/CVE-2020-27618< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-27618" > https://nvd.nist.gov/vuln/detail/CVE-2020-27618< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| locales | CVE-2020-29562 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-29562" > https://access.redhat.com/security/cve/CVE-2020-29562< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210122-0004/" > https://security.netapp.com/advisory/ntap-20210122-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" > https://sourceware.org/bugzilla/show_bug.cgi?id=26923< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html" > https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| locales | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-6096" > https://access.redhat.com/security/cve/CVE-2020-6096< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" > https://nvd.nist.gov/vuln/detail/CVE-2020-6096< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| locales | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3326" > https://access.redhat.com/security/cve/CVE-2021-3326< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3326" > https://nvd.nist.gov/vuln/detail/CVE-2021-3326< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| locales | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-35942" > https://access.redhat.com/security/cve/CVE-2021-35942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-35942" > https://nvd.nist.gov/vuln/detail/CVE-2021-35942< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| locales | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23218" > https://access.redhat.com/security/cve/CVE-2022-23218< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23218.html" > https://linux.oracle.com/cve/CVE-2022-23218.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23218" > https://nvd.nist.gov/vuln/detail/CVE-2022-23218< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" > https://sourceware.org/bugzilla/show_bug.cgi?id=28768< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| locales | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23219" > https://access.redhat.com/security/cve/CVE-2022-23219< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23219.html" > https://linux.oracle.com/cve/CVE-2022-23219.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23219" > https://nvd.nist.gov/vuln/detail/CVE-2022-23219< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" > https://sourceware.org/bugzilla/show_bug.cgi?id=22542< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| login | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | 1:4.5-1ubuntu2.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-7169" > https://access.redhat.com/security/cve/CVE-2018-7169< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" > https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/97" > https://github.com/shadow-maint/shadow/pull/97< / a > < br > < a href = "https://security.gentoo.org/glsa/201805-09" > https://security.gentoo.org/glsa/201805-09< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5254-1" > https://ubuntu.com/security/notices/USN-5254-1< / a > < br > < / details > |
| multiarch-support | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| multiarch-support | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" > http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2009-5155" > https://access.redhat.com/security/cve/CVE-2009-5155< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" > https://sourceware.org/bugzilla/show_bug.cgi?id=11053< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" > https://sourceware.org/bugzilla/show_bug.cgi?id=18986< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434" > https://support.f5.com/csp/article/K64119434< / a > < br > < a href = "https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K64119434?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < / details > |
| multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2017/02/14/9" > http://www.openwall.com/lists/oss-security/2017/02/14/9< / a > < br > < a href = "http://www.securityfocus.com/bid/76916" > http://www.securityfocus.com/bid/76916< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-8985" > https://access.redhat.com/security/cve/CVE-2015-8985< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985< / a > < br > < a href = "https://security.gentoo.org/glsa/201908-06" > https://security.gentoo.org/glsa/201908-06< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| multiarch-support | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10228" > https://access.redhat.com/security/cve/CVE-2016-10228< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| multiarch-support | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html< / a > < br > < a href = "http://www.securityfocus.com/bid/106672" > http://www.securityfocus.com/bid/106672< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2118" > https://access.redhat.com/errata/RHSA-2019:2118< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3513" > https://access.redhat.com/errata/RHSA-2019:3513< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10739" > https://access.redhat.com/security/cve/CVE-2016-10739< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" > https://bugzilla.redhat.com/show_bug.cgi?id=1347549< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10739.html" > https://linux.oracle.com/cve/CVE-2016-10739.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3513.html" > https://linux.oracle.com/errata/ELSA-2019-3513.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" > https://nvd.nist.gov/vuln/detail/CVE-2016-10739< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" > https://sourceware.org/bugzilla/show_bug.cgi?id=20018< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| multiarch-support | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-25013" > https://access.redhat.com/security/cve/CVE-2019-25013< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-25013" > https://nvd.nist.gov/vuln/detail/CVE-2019-25013< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.
| multiarch-support | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27618" > https://access.redhat.com/security/cve/CVE-2020-27618< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-27618" > https://nvd.nist.gov/vuln/detail/CVE-2020-27618< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| multiarch-support | CVE-2020-29562 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-29562" > https://access.redhat.com/security/cve/CVE-2020-29562< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210122-0004/" > https://security.netapp.com/advisory/ntap-20210122-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" > https://sourceware.org/bugzilla/show_bug.cgi?id=26923< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html" > https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| multiarch-support | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-6096" > https://access.redhat.com/security/cve/CVE-2020-6096< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" > https://nvd.nist.gov/vuln/detail/CVE-2020-6096< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| multiarch-support | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3326" > https://access.redhat.com/security/cve/CVE-2021-3326< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3326" > https://nvd.nist.gov/vuln/detail/CVE-2021-3326< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| multiarch-support | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-35942" > https://access.redhat.com/security/cve/CVE-2021-35942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-35942" > https://nvd.nist.gov/vuln/detail/CVE-2021-35942< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| multiarch-support | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23218" > https://access.redhat.com/security/cve/CVE-2022-23218< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23218.html" > https://linux.oracle.com/cve/CVE-2022-23218.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23218" > https://nvd.nist.gov/vuln/detail/CVE-2022-23218< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" > https://sourceware.org/bugzilla/show_bug.cgi?id=28768< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| multiarch-support | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23219" > https://access.redhat.com/security/cve/CVE-2022-23219< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23219.html" > https://linux.oracle.com/cve/CVE-2022-23219.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23219" > https://nvd.nist.gov/vuln/detail/CVE-2022-23219< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" > https://sourceware.org/bugzilla/show_bug.cgi?id=22542< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17594" > https://access.redhat.com/security/cve/CVE-2019-17594< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17595" > https://access.redhat.com/security/cve/CVE-2019-17595< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17594" > https://access.redhat.com/security/cve/CVE-2019-17594< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17594.html" > https://linux.oracle.com/cve/CVE-2019-17594.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" > http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17595" > https://access.redhat.com/security/cve/CVE-2019-17595< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-17595.html" > https://linux.oracle.com/cve/CVE-2019-17595.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4426.html" > https://linux.oracle.com/errata/ELSA-2021-4426.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html" > https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-28" > https://security.gentoo.org/glsa/202101-28< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-2341 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-2341" > https://access.redhat.com/security/cve/CVE-2021-2341< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-2341.html" > https://linux.oracle.com/cve/CVE-2021-2341.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-2845.html" > https://linux.oracle.com/errata/ELSA-2021-2845.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210723-0002/" > https://security.netapp.com/advisory/ntap-20210723-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4946" > https://www.debian.org/security/2021/dsa-4946< / a > < br > < a href = "https://www.oracle.com/java/technologies/javase/11-0-12-relnotes.html" > https://www.oracle.com/java/technologies/javase/11-0-12-relnotes.html< / a > < br > < a href = "https://www.oracle.com/java/technologies/javase/8u301-relnotes.html" > https://www.oracle.com/java/technologies/javase/8u301-relnotes.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2021.html" > https://www.oracle.com/security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-2369 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-2369" > https://access.redhat.com/security/cve/CVE-2021-2369< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-2369.html" > https://linux.oracle.com/cve/CVE-2021-2369.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-2845.html" > https://linux.oracle.com/errata/ELSA-2021-2845.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210723-0002/" > https://security.netapp.com/advisory/ntap-20210723-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4946" > https://www.debian.org/security/2021/dsa-4946< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2021.html" > https://www.oracle.com/security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-2388 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-2388" > https://access.redhat.com/security/cve/CVE-2021-2388< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-2388.html" > https://linux.oracle.com/cve/CVE-2021-2388.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-2845.html" > https://linux.oracle.com/errata/ELSA-2021-2845.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210723-0002/" > https://security.netapp.com/advisory/ntap-20210723-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4946" > https://www.debian.org/security/2021/dsa-4946< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2021.html" > https://www.oracle.com/security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35550 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35550" > https://access.redhat.com/security/cve/CVE-2021-35550< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35550.html" > https://linux.oracle.com/cve/CVE-2021-35550.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3893.html" > https://linux.oracle.com/errata/ELSA-2021-3893.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35556 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35556" > https://access.redhat.com/security/cve/CVE-2021-35556< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35556.html" > https://linux.oracle.com/cve/CVE-2021-35556.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35559 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35559" > https://access.redhat.com/security/cve/CVE-2021-35559< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35559.html" > https://linux.oracle.com/cve/CVE-2021-35559.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35561 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35561" > https://access.redhat.com/security/cve/CVE-2021-35561< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35561.html" > https://linux.oracle.com/cve/CVE-2021-35561.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35564 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35564" > https://access.redhat.com/security/cve/CVE-2021-35564< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35564.html" > https://linux.oracle.com/cve/CVE-2021-35564.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35565 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35565" > https://access.redhat.com/security/cve/CVE-2021-35565< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35565.html" > https://linux.oracle.com/cve/CVE-2021-35565.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3893.html" > https://linux.oracle.com/errata/ELSA-2021-3893.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35567 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35567" > https://access.redhat.com/security/cve/CVE-2021-35567< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35567.html" > https://linux.oracle.com/cve/CVE-2021-35567.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35578 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35578" > https://access.redhat.com/security/cve/CVE-2021-35578< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35578.html" > https://linux.oracle.com/cve/CVE-2021-35578.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35586 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35586" > https://access.redhat.com/security/cve/CVE-2021-35586< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35586.html" > https://linux.oracle.com/cve/CVE-2021-35586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35588 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35588" > https://access.redhat.com/security/cve/CVE-2021-35588< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35588.html" > https://linux.oracle.com/cve/CVE-2021-35588.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3893.html" > https://linux.oracle.com/errata/ELSA-2021-3893.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre | CVE-2021-35603 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35603" > https://access.redhat.com/security/cve/CVE-2021-35603< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35603.html" > https://linux.oracle.com/cve/CVE-2021-35603.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-2341 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-2341" > https://access.redhat.com/security/cve/CVE-2021-2341< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-2341.html" > https://linux.oracle.com/cve/CVE-2021-2341.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-2845.html" > https://linux.oracle.com/errata/ELSA-2021-2845.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210723-0002/" > https://security.netapp.com/advisory/ntap-20210723-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4946" > https://www.debian.org/security/2021/dsa-4946< / a > < br > < a href = "https://www.oracle.com/java/technologies/javase/11-0-12-relnotes.html" > https://www.oracle.com/java/technologies/javase/11-0-12-relnotes.html< / a > < br > < a href = "https://www.oracle.com/java/technologies/javase/8u301-relnotes.html" > https://www.oracle.com/java/technologies/javase/8u301-relnotes.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2021.html" > https://www.oracle.com/security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-2369 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-2369" > https://access.redhat.com/security/cve/CVE-2021-2369< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-2369.html" > https://linux.oracle.com/cve/CVE-2021-2369.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-2845.html" > https://linux.oracle.com/errata/ELSA-2021-2845.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210723-0002/" > https://security.netapp.com/advisory/ntap-20210723-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4946" > https://www.debian.org/security/2021/dsa-4946< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2021.html" > https://www.oracle.com/security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-2388 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-2388" > https://access.redhat.com/security/cve/CVE-2021-2388< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-2388.html" > https://linux.oracle.com/cve/CVE-2021-2388.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-2845.html" > https://linux.oracle.com/errata/ELSA-2021-2845.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210723-0002/" > https://security.netapp.com/advisory/ntap-20210723-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4946" > https://www.debian.org/security/2021/dsa-4946< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2021.html" > https://www.oracle.com/security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35550 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35550" > https://access.redhat.com/security/cve/CVE-2021-35550< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35550.html" > https://linux.oracle.com/cve/CVE-2021-35550.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3893.html" > https://linux.oracle.com/errata/ELSA-2021-3893.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35556 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35556" > https://access.redhat.com/security/cve/CVE-2021-35556< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35556.html" > https://linux.oracle.com/cve/CVE-2021-35556.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35559 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35559" > https://access.redhat.com/security/cve/CVE-2021-35559< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35559.html" > https://linux.oracle.com/cve/CVE-2021-35559.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35561 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35561" > https://access.redhat.com/security/cve/CVE-2021-35561< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35561.html" > https://linux.oracle.com/cve/CVE-2021-35561.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35564 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35564" > https://access.redhat.com/security/cve/CVE-2021-35564< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35564.html" > https://linux.oracle.com/cve/CVE-2021-35564.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35565 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35565" > https://access.redhat.com/security/cve/CVE-2021-35565< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35565.html" > https://linux.oracle.com/cve/CVE-2021-35565.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3893.html" > https://linux.oracle.com/errata/ELSA-2021-3893.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35567 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35567" > https://access.redhat.com/security/cve/CVE-2021-35567< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35567.html" > https://linux.oracle.com/cve/CVE-2021-35567.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35578 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35578" > https://access.redhat.com/security/cve/CVE-2021-35578< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35578.html" > https://linux.oracle.com/cve/CVE-2021-35578.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35586 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35586" > https://access.redhat.com/security/cve/CVE-2021-35586< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35586.html" > https://linux.oracle.com/cve/CVE-2021-35586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35588 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35588" > https://access.redhat.com/security/cve/CVE-2021-35588< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35588.html" > https://linux.oracle.com/cve/CVE-2021-35588.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3893.html" > https://linux.oracle.com/errata/ELSA-2021-3893.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| openjdk-8-jre-headless | CVE-2021-35603 | MEDIUM | 8u292-b10-0ubuntu1~18.04 | 8u312-b07-0ubuntu1~18.04 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35603" > https://access.redhat.com/security/cve/CVE-2021-35603< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35603.html" > https://linux.oracle.com/cve/CVE-2021-35603.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4135.html" > https://linux.oracle.com/errata/ELSA-2021-4135.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" > https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0004/" > https://security.netapp.com/advisory/ntap-20211022-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5202-1" > https://ubuntu.com/security/notices/USN-5202-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5000" > https://www.debian.org/security/2021/dsa-5000< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5012" > https://www.debian.org/security/2021/dsa-5012< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| openssl | CVE-2022-0778 | HIGH | 1.1.1-1ubuntu2.1~18.04.13 | 1.1.1-1ubuntu2.1~18.04.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9272.html" > https://linux.oracle.com/errata/ELSA-2022-9272.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-07" > https://www.tenable.com/security/tns-2022-07< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-08" > https://www.tenable.com/security/tns-2022-08< / a > < br > < a h
2022-03-30 20:23:21 +00:00
| passwd | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | 1:4.5-1ubuntu2.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-7169" > https://access.redhat.com/security/cve/CVE-2018-7169< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" > https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/97" > https://github.com/shadow-maint/shadow/pull/97< / a > < br > < a href = "https://security.gentoo.org/glsa/201805-09" > https://security.gentoo.org/glsa/201805-09< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5254-1" > https://ubuntu.com/security/notices/USN-5254-1< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | MEDIUM | 5.26.1-6ubuntu0.5 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c" > https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| tar | CVE-2021-20193 | LOW | 1.29b-2ubuntu0.2 | 1.29b-2ubuntu0.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-20193" > https://access.redhat.com/security/cve/CVE-2021-20193< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1917565" > https://bugzilla.redhat.com/show_bug.cgi?id=1917565< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193< / a > < br > < a href = "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777" > https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777< / a > < br > < a href = "https://savannah.gnu.org/bugs/?59897" > https://savannah.gnu.org/bugs/?59897< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-29" > https://security.gentoo.org/glsa/202105-29< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5329-1" > https://ubuntu.com/security/notices/USN-5329-1< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
| x11-common | CVE-2012-1093 | LOW | 1:7.7+19ubuntu7.1 | | < details > < summary > Expand...< / summary > < a href = "http://vladz.devzero.fr/012_x11-common-vuln.html" > http://vladz.devzero.fr/012_x11-common-vuln.html< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2012/02/29/1" > http://www.openwall.com/lists/oss-security/2012/02/29/1< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2012/03/01/1" > http://www.openwall.com/lists/oss-security/2012/03/01/1< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2012-1093" > https://access.redhat.com/security/cve/cve-2012-1093< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2012-1093" > https://security-tracker.debian.org/tracker/CVE-2012-1093< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-0ubuntu2 | 1:1.2.11.dfsg-0ubuntu2.1 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4" > https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" > https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5< / a > < br > < a href = "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ" > https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" > https://nvd.nist.gov/vuln/detail/CVE-2018-25032< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5359-1" > https://ubuntu.com/security/notices/USN-5359-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5111" > https://www.debian.org/security/2022/dsa-5111< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/24/1" > https://www.openwall.com/lists/oss-security/2022/03/24/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/1" > https://www.openwall.com/lists/oss-security/2022/03/28/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/3" > https://www.openwall.com/lists/oss-security/2022/03/28/3< / a > < br > < / details > |
2021-12-05 00:50:14 +00:00
2021-12-04 20:11:45 +00:00
**jar**
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-03-30 20:23:21 +00:00
| ch.qos.logback:logback-classic | CVE-2017-5929 | CRITICAL | 1.1.11 | 1.2.0 | < details > < summary > Expand...< / summary > < a href = "http://www.cvedetails.com/cve/CVE-2017-5929/" > http://www.cvedetails.com/cve/CVE-2017-5929/< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2017:1675" > https://access.redhat.com/errata/RHSA-2017:1675< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2017:1676" > https://access.redhat.com/errata/RHSA-2017:1676< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2017:1832" > https://access.redhat.com/errata/RHSA-2017:1832< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2927" > https://access.redhat.com/errata/RHSA-2018:2927< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-5929" > https://access.redhat.com/security/cve/CVE-2017-5929< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929< / a > < br > < a href = "https://github.com/advisories/GHSA-vmfg-rjjm-rjrj" > https://github.com/advisories/GHSA-vmfg-rjjm-rjrj< / a > < br > < a href = "https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8" > https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8< / a > < br > < a href = "https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E" > https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770
2022-04-26 20:05:48 +00:00
| ch.qos.logback:logback-core | CVE-2021-42550 | MEDIUM | 1.1.11 | 1.2.9 | < details > < summary > Expand...< / summary > < a href = "http://logback.qos.ch/news.html" > http://logback.qos.ch/news.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-42550" > https://access.redhat.com/security/cve/CVE-2021-42550< / a > < br > < a href = "https://cve.report/CVE-2021-42550" > https://cve.report/CVE-2021-42550< / a > < br > < a href = "https://github.com/advisories/GHSA-668q-qrv7-99fm" > https://github.com/advisories/GHSA-668q-qrv7-99fm< / a > < br > < a href = "https://github.com/cn-panda/logbackRceDemo" > https://github.com/cn-panda/logbackRceDemo< / a > < br > < a href = "https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html" > https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html< / a > < br > < a href = "https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c" > https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c< / a > < br > < a href = "https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42" > https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42< / a > < br > < a href = "https://jira.qos.ch/browse/LOGBACK-1591" > https://jira.qos.ch/browse/LOGBACK-1591< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42550" > https://nvd.nist.gov/vuln/detail/CVE-2021-42550< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211229-0001/" > https://security.netapp.com/advisory/ntap-20211229-0001/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| com.fasterxml.jackson.core:jackson-databind | CVE-2020-25649 | HIGH | 2.10.3 | 2.6.7.4, 2.9.10.7, 2.10.5.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-25649" > https://access.redhat.com/security/cve/CVE-2020-25649< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1887664" > https://bugzilla.redhat.com/show_bug.cgi?id=1887664< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649< / a > < br > < a href = "https://github.com/FasterXML/jackson-databind/commit/612f971b78c60202e9cd75a299050c8f2d724a59 (jackson-databind-2.11.0.rc1)" > https://github.com/FasterXML/jackson-databind/commit/612f971b78c60202e9cd75a299050c8f2d724a59 (jackson-databind-2.11.0.rc1)< / a > < br > < a href = "https://github.com/FasterXML/jackson-databind/issues/2589" > https://github.com/FasterXML/jackson-databind/issues/2589< / a > < br > < a href = "https://github.com/advisories/GHSA-288c-cq4h-88gq" > https://github.com/advisories/GHSA-288c-cq4h-88gq< / a > < br > < a href = "https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E" > https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r024b7bda9c43c5560d81238748775c5ecfe01b57280f90df1f773949@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r024b7bda9c43c5560d81238748775c5ecfe01b57280f90df1f773949@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E" > https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E" > https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3e6ae311842de4
| com.fasterxml.jackson.core:jackson-databind | CVE-2020-36518 | HIGH | 2.10.3 | 2.12.6.1, 2.13.2.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-36518" > https://access.redhat.com/security/cve/CVE-2020-36518< / a > < br > < a href = "https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b" > https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b< / a > < br > < a href = "https://github.com/FasterXML/jackson-databind/issues/2816" > https://github.com/FasterXML/jackson-databind/issues/2816< / a > < br > < a href = "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12" > https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12< / a > < br > < a href = "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13" > https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13< / a > < br > < a href = "https://github.com/advisories/GHSA-57j2-w4cx-62h2" > https://github.com/advisories/GHSA-57j2-w4cx-62h2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-36518" > https://nvd.nist.gov/vuln/detail/CVE-2020-36518< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| com.google.guava:guava | CVE-2020-8908 | LOW | 28.2-jre | 30.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-8908" > https://access.redhat.com/security/cve/CVE-2020-8908< / a > < br > < a href = "https://github.com/advisories/GHSA-5mg8-w23w-74h3" > https://github.com/advisories/GHSA-5mg8-w23w-74h3< / a > < br > < a href = "https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40" > https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40< / a > < br > < a href = "https://github.com/google/guava/issues/4011" > https://github.com/google/guava/issues/4011< / a > < br > < a href = "https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E" > https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E" > https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E" > https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E" > https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44@%3Cissues.geode.apache.org%3E" > https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea
| com.google.protobuf:protobuf-java | CVE-2021-22569 | MEDIUM | 3.6.1 | 3.16.1, 3.18.2, 3.19.2 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/12/4" > http://www.openwall.com/lists/oss-security/2022/01/12/4< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/12/7" > http://www.openwall.com/lists/oss-security/2022/01/12/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22569" > https://access.redhat.com/security/cve/CVE-2021-22569< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330< / a > < br > < a href = "https://cloud.google.com/support/bulletins#gcp-2022-001" > https://cloud.google.com/support/bulletins#gcp-2022-001< / a > < br > < a href = "https://github.com/advisories/GHSA-wrvw-hg22-4m67" > https://github.com/advisories/GHSA-wrvw-hg22-4m67< / a > < br > < a href = "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b" > https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b< / a > < br > < a href = "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67" > https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22569" > https://nvd.nist.gov/vuln/detail/CVE-2021-22569< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-02-08 17:15:24 +00:00
| com.google.protobuf:protobuf-java | GMS-2022-5 | UNKNOWN | 3.6.1 | 3.16.1, 3.18.2, 3.19.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-wrvw-hg22-4m67" > https://github.com/advisories/GHSA-wrvw-hg22-4m67< / a > < br > < a href = "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67" > https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| commons-io:commons-io | CVE-2021-29425 | MEDIUM | 2.6 | 2.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-29425" > https://access.redhat.com/security/cve/CVE-2021-29425< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425< / a > < br > < a href = "https://github.com/advisories/GHSA-gwrp-pvrq-jmwv" > https://github.com/advisories/GHSA-gwrp-pvrq-jmwv< / a > < br > < a href = "https://issues.apache.org/jira/browse/IO-556" > https://issues.apache.org/jira/browse/IO-556< / a > < br > < a href = "https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E" > https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E" > https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E" > https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E" > https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E" > https://lists.apache.org/thre
2022-03-30 20:23:21 +00:00
| mysql:mysql-connector-java | CVE-2020-2934 | MEDIUM | 8.0.19 | 5.1.49, 8.0.20 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-2934" > https://access.redhat.com/security/cve/CVE-2020-2934< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html" > https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-2934" > https://nvd.nist.gov/vuln/detail/CVE-2020-2934< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-27" > https://security.gentoo.org/glsa/202105-27< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4703" > https://www.debian.org/security/2020/dsa-4703< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| org.apache.ant:ant | CVE-2020-1945 | MEDIUM | 1.10.5 | 1.9.15, 1.10.8 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2020/09/30/6" > http://www.openwall.com/lists/oss-security/2020/09/30/6< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2020/12/06/1" > http://www.openwall.com/lists/oss-security/2020/12/06/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-1945" > https://access.redhat.com/security/cve/CVE-2020-1945< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1945< / a > < br > < a href = "https://github.com/advisories/GHSA-4p6w-m9wc-c9c9" > https://github.com/advisories/GHSA-4p6w-m9wc-c9c9< / a > < br > < a href = "https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E" > https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.apache.org%3E" > https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.ap
2022-04-20 21:21:59 +00:00
| org.apache.ant:ant | CVE-2021-36373 | MEDIUM | 1.10.5 | 1.9.16, 1.10.11 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36373" > https://access.redhat.com/security/cve/CVE-2021-36373< / a > < br > < a href = "https://ant.apache.org/security.html" > https://ant.apache.org/security.html< / a > < br > < a href = "https://github.com/advisories/GHSA-q5r4-cfpx-h6fh" > https://github.com/advisories/GHSA-q5r4-cfpx-h6fh< / a > < br > < a href = "https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E" > https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E" > https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46%40%3Cuser.ant.apache.org%3E" > https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46%40%3Cuser.ant.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E" > https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E" > https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36373" > https://nvd.nist.gov/vuln/detail/CVE-2021-36373< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210819-0007/" > https://security.netapp.com/advisory/ntap-20210819-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| org.apache.ant:ant | CVE-2021-36374 | MEDIUM | 1.10.5 | 1.9.16, 1.10.11 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36374" > https://access.redhat.com/security/cve/CVE-2021-36374< / a > < br > < a href = "https://ant.apache.org/security.html" > https://ant.apache.org/security.html< / a > < br > < a href = "https://github.com/advisories/GHSA-5v34-g2px-j4fw" > https://github.com/advisories/GHSA-5v34-g2px-j4fw< / a > < br > < a href = "https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E" > https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E" > https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E" > https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E" > https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E" > https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36374" > https://nvd.nist.gov/vuln/detail/CVE-2021-36374< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210819-0007/" > https://security.netapp.com/advisory/ntap-20210819-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.9 | 4.5.13 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-13956" > https://access.redhat.com/security/cve/CVE-2020-13956< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1886587" > https://bugzilla.redhat.com/show_bug.cgi?id=1886587< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956< / a > < br > < a href = "https://github.com/advisories/GHSA-7r82-7xv7-xcpj" > https://github.com/advisories/GHSA-7r82-7xv7-xcpj< / a > < br > < a href = "https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E" > https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E" > https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E" > https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E" > https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E" > https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E" > https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E" > https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E" > https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E" > https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%
2022-03-30 20:23:21 +00:00
| org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-13934 | HIGH | 8.5.51 | 8.5.57, 9.0.37 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html< / a > < br > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3Cad62f54e-8fd7-e326-25f1-3bdf1ffa3818%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3Cad62f54e-8fd7-e326-25f1-3bdf1ffa3818%40apache.org%3E< / a > < br > < a href = "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7" > http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7< / a > < br > < a href = "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105" > http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105< / a > < br > < a href = "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57" > http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57< / a > < br > < a href = "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37" > http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13934" > https://access.redhat.com/security/cve/CVE-2020-13934< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13934" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13934< / a > < br > < a href = "https://github.com/advisories/GHSA-vf77-8h7g-gghp" > https://github.com/advisories/GHSA-vf77-8h7g-gghp< / a > < br > < a href = "https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html" > https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-13934" > https://nvd.nist.gov/vuln/detail/CVE-2020-13934< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200724-0003/" > https://security.netapp.com/advisory/ntap-20200724-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4596-1" > https://ubuntu.com/security/notices/USN-4596-1< / a > < br > < a href = "https://usn.ubuntu.com/4596-1/" > https://usn.ubuntu.com/4596-1/< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4727" > https://www.debian.org/security/2020/dsa-4727< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2020/07/14/4" > https://www.openwall.com/lists/oss-security/2020/07/14/4< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-17527 | HIGH | 8.5.51 | 8.5.60, 9.0.40, 10.0.2 | < details > < summary > Expand...< / summary > < a href = "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10" > http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10< / a > < br > < a href = "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60" > http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60< / a > < br > < a href = "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40" > http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2020/12/03/3" > http://www.openwall.com/lists/oss-security/2020/12/03/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-17527" > https://access.redhat.com/security/cve/CVE-2020-17527< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527< / a > < br > < a href = "https://github.com/advisories/GHSA-vvw4-rfwf-p6hx" > https://github.com/advisories/GHSA-vvw4-rfwf-p6hx< / a > < br > < a href = "https://github.com/apache/tomcat/commit/21e3408671aac7e0d7e264e720cac8b1b189eb29 (8.5.60)" > https://github.com/apache/tomcat/commit/21e3408671aac7e0d7e264e720cac8b1b189eb29 (8.5.60)< / a > < br > < a href = "https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65 (9.0.40)" > https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65 (9.0.40)< / a > < br > < a href = "https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa@%3Ccommits.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa@%3Ccommits.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E" > https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rabbe6b3ae6a9795641d7a05c00d2378d5bbbe4240b7e20f09b092cce@%3Cissues.guacamole.apache.org%3E" > ht
2022-04-03 16:31:59 +00:00
| org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-9484 | HIGH | 8.5.51 | 7.0.104, 8.5.55, 9.0.35, 10.0.0-M5 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html" > http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html< / a > < br > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E< / a > < br > < a href = "http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html" > http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2020/Jun/6" > http://seclists.org/fulldisclosure/2020/Jun/6< / a > < br > < a href = "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5" > http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5< / a > < br > < a href = "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104" > http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104< / a > < br > < a href = "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55" > http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55< / a > < br > < a href = "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35" > http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/03/01/2" > http://www.openwall.com/lists/oss-security/2021/03/01/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-9484" > https://access.redhat.com/security/cve/CVE-2020-9484< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484< / a > < br > < a href = "https://github.com/advisories/GHSA-344f-f5vg-2jfj" > https://github.com/advisories/GHSA-344f-f5vg-2jfj< / a > < br > < a href = "https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)" > https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)< / a > < br > < a href = "https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)" > https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)< / a > < br > < a href = "https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)" > https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)< / a > < br > < a href = "https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)" > https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10332" > https://kc.mcafee.com/corporate/index?page=content& id=SB10332< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-9484.html" > https://linux.oracle.com/cve/CVE-2020-9484.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-2530.html" > https://linux.oracle.com/errata/ELSA-2020-2530.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.h
| org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25122 | HIGH | 8.5.51 | 8.5.63, 9.0.43, 10.0.2 | < details > < summary > Expand...< / summary > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/03/01/1" > http://www.openwall.com/lists/oss-security/2021/03/01/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-25122" > https://access.redhat.com/security/cve/CVE-2021-25122< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25122" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25122< / a > < br > < a href = "https://github.com/advisories/GHSA-j39c-c8hj-x4j3" > https://github.com/advisories/GHSA-j39c-c8hj-x4j3< / a > < br > < a href = "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E" > https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-25122" > https://nvd.nist.gov/vuln/detail/CVE-2021-25122< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210409-0002/" > https://security.netapp.com/advisory/ntap-20210409-0002/< / a > < br > < a href = "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2" > https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2< / a > < br > < a href = "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63" > https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63< / a > < br > < a href = "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43" > https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5360-1" > https://ubuntu.com/security/notices/USN-5360-1< / a > < br > < a href = "https://www.debian.org
| org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25329 | HIGH | 8.5.51 | 7.0.108, 8.5.63, 9.0.43, 10.0.2 | < details > < summary > Expand...< / summary > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/03/01/2" > http://www.openwall.com/lists/oss-security/2021/03/01/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-25329" > https://access.redhat.com/security/cve/CVE-2021-25329< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329< / a > < br > < a href = "https://github.com/advisories/GHSA-jgwr-3qm3-26f3" > https://github.com/advisories/GHSA-jgwr-3qm3-26f3< / a > < br > < a href = "https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4" > https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4< / a > < br > < a href = "https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E" > https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-25329" > https://nvd.nist.gov/vuln/detail/CVE-2021-25329< / a > < br > < a href = "https://security.netapp.com
2022-03-30 20:23:21 +00:00
| org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-24122 | MEDIUM | 8.5.51 | 10.0.0-M10, 9.0.40, 8.5.60, 7.0.107 | < details > < summary > Expand...< / summary > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E< / a > < br > < a href = "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107" > http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107< / a > < br > < a href = "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60" > http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60< / a > < br > < a href = "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40" > http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/01/14/1" > http://www.openwall.com/lists/oss-security/2021/01/14/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-24122" > https://access.redhat.com/security/cve/CVE-2021-24122< / a > < br > < a href = "https://github.com/advisories/GHSA-2rvv-w9r2-rg7m" > https://github.com/advisories/GHSA-2rvv-w9r2-rg7m< / a > < br > < a href = "https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E" > https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-24122" > https://nvd.nist.gov/vuln/detail/CVE-2021-24122< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210212-0008/" > https://security.netapp.com/advisory/ntap-20210212-0008/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2020-13935 | HIGH | 8.5.51 | 7.0.105, 8.5.57, 9.0.37, 10.0.2 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html< / a > < br > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E< / a > < br > < a href = "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7" > http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7< / a > < br > < a href = "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105" > http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105< / a > < br > < a href = "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57" > http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57< / a > < br > < a href = "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37" > http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13935" > https://access.redhat.com/security/cve/CVE-2020-13935< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935< / a > < br > < a href = "https://github.com/advisories/GHSA-m7jv-hq7h-mq7c" > https://github.com/advisories/GHSA-m7jv-hq7h-mq7c< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10332" > https://kc.mcafee.com/corporate/index?page=content& id=SB10332< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13935.html" > https://linux.oracle.com/cve/CVE-2020-13935.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4004.html" > https://linux.oracle.com/errata/ELSA-2020-4004.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html" > https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-13935" > https://nvd.nist.gov/vuln/detail/CVE-2020-13935< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200724-0003/" > https://security.netapp.com/advisory/ntap-20200724-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4448-1" > https://ubuntu.com/security/notices/USN-4448-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4596-1" > https://ubuntu.com/security/notices/USN-4596-1< / a > < br > < a href = "https://usn.ubuntu.com/4448-1/" > https://usn.ubuntu.com/4448-1/< / a > < br > < a href = "https://usn.ubuntu.com/4596-1/" > https://usn.ubuntu.com/4596-1/< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4727" > https://www.debian.org/security/2020/dsa-4727< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2020/07/14/3" > https://www.openwall.com/lists/oss-security/2020/07/14/3< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/secur
2022-03-30 20:23:21 +00:00
| org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2021-24122 | MEDIUM | 8.5.51 | 10.0.0-M10, 9.0.40, 8.5.60, 7.0.107 | < details > < summary > Expand...< / summary > < a href = "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E" > http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E< / a > < br > < a href = "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107" > http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107< / a > < br > < a href = "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60" > http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60< / a > < br > < a href = "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40" > http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/01/14/1" > http://www.openwall.com/lists/oss-security/2021/01/14/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-24122" > https://access.redhat.com/security/cve/CVE-2021-24122< / a > < br > < a href = "https://github.com/advisories/GHSA-2rvv-w9r2-rg7m" > https://github.com/advisories/GHSA-2rvv-w9r2-rg7m< / a > < br > < a href = "https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E" > https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E" > https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-24122" > https://nvd.nist.gov/vuln/detail/CVE-2021-24122< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210212-0008/" > https://security.netapp.com/advisory/ntap-20210212-0008/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| org.hibernate:hibernate-validator | CVE-2020-10693 | MEDIUM | 5.3.6.Final | 6.0.20.Final, 6.1.5.Final, 7.0.0.CR1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-10693" > https://access.redhat.com/security/cve/CVE-2020-10693< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693< / a > < br > < a href = "https://github.com/advisories/GHSA-rmrm-75hp-phr2" > https://github.com/advisories/GHSA-rmrm-75hp-phr2< / a > < br > < a href = "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E" > https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-10693" > https://nvd.nist.gov/vuln/detail/CVE-2020-10693< / a > < br > < a href = "https://www.ibm.com/support/pages/node/6348216" > https://www.ibm.com/support/pages/node/6348216< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| org.jdom:jdom | CVE-2021-33813 | HIGH | 2.0.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-33813" > https://access.redhat.com/security/cve/CVE-2021-33813< / a > < br > < a href = "https://alephsecurity.com/vulns/aleph-2021003" > https://alephsecurity.com/vulns/aleph-2021003< / a > < br > < a href = "https://github.com/advisories/GHSA-2363-cqg2-863c" > https://github.com/advisories/GHSA-2363-cqg2-863c< / a > < br > < a href = "https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361" > https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361< / a > < br > < a href = "https://github.com/hunterhacker/jdom/pull/188" > https://github.com/hunterhacker/jdom/pull/188< / a > < br > < a href = "https://github.com/hunterhacker/jdom/releases" > https://github.com/hunterhacker/jdom/releases< / a > < br > < a href = "https://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E" > https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E" > https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/06/msg00026.html" > https://lists.debian.org/debian-lts-announce/2021/06/msg00026.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/07/msg00012.html" > https://lists.debian.org/debian-lts-announce/2021/07/msg00012.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33813" > https://nvd.nist.gov/vuln/detail/CVE-2021-33813< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-03-26 15:30:42 +00:00
| org.liquibase:liquibase-core | CVE-2022-0839 | CRITICAL | 3.8.7 | 4.8.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-jvfv-hrrc-6q72" > https://github.com/advisories/GHSA-jvfv-hrrc-6q72< / a > < br > < a href = "https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381" > https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381< / a > < br > < a href = "https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70" > https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0839" > https://nvd.nist.gov/vuln/detail/CVE-2022-0839< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| org.postgresql:postgresql | CVE-2022-21724 | CRITICAL | 42.2.10 | 42.2.25, 42.3.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-21724" > https://access.redhat.com/security/cve/CVE-2022-21724< / a > < br > < a href = "https://github.com/advisories/GHSA-v7wg-cpwc-24m4" > https://github.com/advisories/GHSA-v7wg-cpwc-24m4< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813" > https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4" > https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21724" > https://nvd.nist.gov/vuln/detail/CVE-2022-21724< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220311-0005/" > https://security.netapp.com/advisory/ntap-20220311-0005/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| org.postgresql:postgresql | CVE-2020-13692 | HIGH | 42.2.10 | 42.2.13 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-13692" > https://access.redhat.com/security/cve/CVE-2020-13692< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13692" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13692< / a > < br > < a href = "https://github.com/advisories/GHSA-88cc-g835-76rp" > https://github.com/advisories/GHSA-88cc-g835-76rp< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65" > https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65< / a > < br > < a href = "https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13" > https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13692.html" > https://linux.oracle.com/cve/CVE-2020-13692.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-3285.html" > https://linux.oracle.com/errata/ELSA-2020-3285.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E" > https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E" > https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E" > https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-13692" > https://nvd.nist.gov/vuln/detail/CVE-2020-13692< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200619-0005/" > https://security.netapp.com/advisory/ntap-20200619-0005/< / a > < br > < / details > |
2022-02-22 00:08:46 +00:00
| org.postgresql:postgresql | GHSA-673j-qm5f-xpv8 | MEDIUM | 42.2.10 | 42.3.3 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-673j-qm5f-xpv8" > https://github.com/advisories/GHSA-673j-qm5f-xpv8< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064" > https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8" > https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8< / a > < br > < / details > |
2022-03-26 15:30:42 +00:00
| org.postgresql:postgresql | GMS-2022-75 | UNKNOWN | 42.2.10 | 42.3.3 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-673j-qm5f-xpv8" > https://github.com/advisories/GHSA-673j-qm5f-xpv8< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064" > https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064< / a > < br > < a href = "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8" > https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| org.springframework.boot:spring-boot | GMS-2022-560 | UNKNOWN | 1.5.22.RELEASE | 2.5.12, 2.6.6 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-36p3-wjmg-h94x" > https://github.com/advisories/GHSA-36p3-wjmg-h94x< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12" > https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6" > https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15" > https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE" > https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18" > https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22965" > https://nvd.nist.gov/vuln/detail/CVE-2022-22965< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22965" > https://tanzu.vmware.com/security/cve-2022-22965< / a > < br > < / details > |
| org.springframework.boot:spring-boot | GMS-2022-561 | UNKNOWN | 1.5.22.RELEASE | 2.5.12, 2.6.6 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-36p3-wjmg-h94x" > https://github.com/advisories/GHSA-36p3-wjmg-h94x< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12" > https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6" > https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15" > https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE" > https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18" > https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22965" > https://nvd.nist.gov/vuln/detail/CVE-2022-22965< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22965" > https://tanzu.vmware.com/security/cve-2022-22965< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| org.springframework.boot:spring-boot-starter-web | CVE-2022-22965 | CRITICAL | 1.5.22.RELEASE | 2.6.6, 2.5.12 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html" > http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22965" > https://access.redhat.com/security/cve/CVE-2022-22965< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-36p3-wjmg-h94x" > https://github.com/advisories/GHSA-36p3-wjmg-h94x< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12" > https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6" > https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15" > https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE" > https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18" > https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22965" > https://nvd.nist.gov/vuln/detail/CVE-2022-22965< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22965" > https://tanzu.vmware.com/security/cve-2022-22965< / a > < br > < a href = "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67" > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67< / a > < br > < a href = "https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html" > https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.praetorian.com/blog/spring-core-jdk9-rce/" > https://www.praetorian.com/blog/spring-core-jdk9-rce/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| org.springframework.security:spring-security-core | CVE-2021-22112 | HIGH | 4.2.13.RELEASE | 5.2.9.RELEASE, 5.3.8.RELEASE, 5.4.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/02/19/7" > http://www.openwall.com/lists/oss-security/2021/02/19/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22112" > https://access.redhat.com/security/cve/CVE-2021-22112< / a > < br > < a href = "https://github.com/advisories/GHSA-gq28-h5vg-8prx" > https://github.com/advisories/GHSA-gq28-h5vg-8prx< / a > < br > < a href = "https://github.com/spring-projects/spring-security/releases/tag/5.4.4" > https://github.com/spring-projects/spring-security/releases/tag/5.4.4< / a > < br > < a href = "https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E" > https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E" > https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E" > https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22112" > https://nvd.nist.gov/vuln/detail/CVE-2021-22112< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2021-22112" > https://tanzu.vmware.com/security/cve-2021-22112< / a > < br > < a href = "https://www.jenkins.io/security/advisory/2021-02-19/" > https://www.jenkins.io/security/advisory/2021-02-19/< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https:
2021-12-05 00:50:14 +00:00
| org.springframework.security:spring-security-core | CVE-2020-5408 | MEDIUM | 4.2.13.RELEASE | 4.2.16.RELEASE, 5.0.16.RELEASE, 5.1.10.RELEASE, 5.2.4.RELEASE, 5.3.2.RELEASE | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-2ppp-9496-p23q" > https://github.com/advisories/GHSA-2ppp-9496-p23q< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-5408" > https://nvd.nist.gov/vuln/detail/CVE-2020-5408< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2020-5408" > https://tanzu.vmware.com/security/cve-2020-5408< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| org.springframework.security:spring-security-web | CVE-2021-22112 | HIGH | 4.2.13.RELEASE | 5.2.9, 5.2.9, 5.4.4, 5.4.4 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/02/19/7" > http://www.openwall.com/lists/oss-security/2021/02/19/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22112" > https://access.redhat.com/security/cve/CVE-2021-22112< / a > < br > < a href = "https://github.com/advisories/GHSA-gq28-h5vg-8prx" > https://github.com/advisories/GHSA-gq28-h5vg-8prx< / a > < br > < a href = "https://github.com/spring-projects/spring-security/releases/tag/5.4.4" > https://github.com/spring-projects/spring-security/releases/tag/5.4.4< / a > < br > < a href = "https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E" > https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E" > https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E" > https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E" > https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22112" > https://nvd.nist.gov/vuln/detail/CVE-2021-22112< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2021-22112" > https://tanzu.vmware.com/security/cve-2021-22112< / a > < br > < a href = "https://www.jenkins.io/security/advisory/2021-02-19/" > https://www.jenkins.io/security/advisory/2021-02-19/< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.orac
2022-04-20 21:21:59 +00:00
| org.springframework:spring-beans | CVE-2022-22965 | CRITICAL | 4.3.25.RELEASE | 5.3.18, 5.2.20 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html" > http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22965" > https://access.redhat.com/security/cve/CVE-2022-22965< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-36p3-wjmg-h94x" > https://github.com/advisories/GHSA-36p3-wjmg-h94x< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12" > https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6" > https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15" > https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE" > https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18" > https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22965" > https://nvd.nist.gov/vuln/detail/CVE-2022-22965< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22965" > https://tanzu.vmware.com/security/cve-2022-22965< / a > < br > < a href = "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67" > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67< / a > < br > < a href = "https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html" > https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.praetorian.com/blog/spring-core-jdk9-rce/" > https://www.praetorian.com/blog/spring-core-jdk9-rce/< / a > < br > < / details > |
2022-04-12 17:24:36 +00:00
| org.springframework:spring-core | CVE-2022-22950 | MEDIUM | 4.3.25.RELEASE | 5.2.20, 5.3.16 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22950" > https://access.redhat.com/security/cve/CVE-2022-22950< / a > < br > < a href = "https://github.com/advisories/GHSA-558x-2xjg-6232" > https://github.com/advisories/GHSA-558x-2xjg-6232< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22950" > https://nvd.nist.gov/vuln/detail/CVE-2022-22950< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22950" > https://tanzu.vmware.com/security/cve-2022-22950< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| org.springframework:spring-core | CVE-2022-22968 | LOW | 4.3.25.RELEASE | 5.2.21, 5.3.19 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22968" > https://access.redhat.com/security/cve/CVE-2022-22968< / a > < br > < a href = "https://github.com/advisories/GHSA-g5mm-vmx4-3rg7" > https://github.com/advisories/GHSA-g5mm-vmx4-3rg7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22968" > https://nvd.nist.gov/vuln/detail/CVE-2022-22968< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22968" > https://tanzu.vmware.com/security/cve-2022-22968< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| org.springframework:spring-webmvc | CVE-2022-22965 | CRITICAL | 4.3.25.RELEASE | 5.3.18, 5.2.20 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html" > http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22965" > https://access.redhat.com/security/cve/CVE-2022-22965< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-36p3-wjmg-h94x" > https://github.com/advisories/GHSA-36p3-wjmg-h94x< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12" > https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12< / a > < br > < a href = "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6" > https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15" > https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE" > https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE< / a > < br > < a href = "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18" > https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22965" > https://nvd.nist.gov/vuln/detail/CVE-2022-22965< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement< / a > < br > < a href = "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds" > https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds< / a > < br > < a href = "https://tanzu.vmware.com/security/cve-2022-22965" > https://tanzu.vmware.com/security/cve-2022-22965< / a > < br > < a href = "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67" > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67< / a > < br > < a href = "https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html" > https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.praetorian.com/blog/spring-core-jdk9-rce/" > https://www.praetorian.com/blog/spring-core-jdk9-rce/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| org.yaml:snakeyaml | CVE-2017-18640 | HIGH | 1.17 | 1.26 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2017-18640" > https://access.redhat.com/security/cve/CVE-2017-18640< / a > < br > < a href = "https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c" > https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c< / a > < br > < a href = "https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion" > https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion< / a > < br > < a href = "https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack" > https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack< / a > < br > < a href = "https://bitbucket.org/asomov/snakeyaml/wiki/Changes" > https://bitbucket.org/asomov/snakeyaml/wiki/Changes< / a > < br > < a href = "https://github.com/advisories/GHSA-rvwf-54qp-4r6v" > https://github.com/advisories/GHSA-rvwf-54qp-4r6v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2017-18640.html" > https://linux.oracle.com/cve/CVE-2017-18640.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4807.html" > https://linux.oracle.com/errata/ELSA-2020-4807.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E" > https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E" > https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E" > https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r22ac2aa05