2022-03-15 17:44:22 +00:00
---
hide:
- toc
---
# Security Overview
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
## Helm-Chart
##### Scan Results
#### Chart Object: iyuuplus/templates/common.yaml
2022-03-15 18:22:06 +00:00
2022-03-15 17:44:22 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv001" > https://avd.aquasec.com/appshield/ksv001< / a > < br > < / details > |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-iyuuplus' of Deployment ' RELEASE-NAME-iyuuplus' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | < details > < summary > Expand...< / summary > Enforcing CPU limits prevents DoS via resource exhaustion. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' resources.limits.cpu' < / details > | < details > < summary > Expand...< / summary > < a href = "https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits" > https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv011" > https://avd.aquasec.com/appshield/ksv011< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-iyuuplus' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-iyuuplus' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | < details > < summary > Expand...< / summary > When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' resources.requests.cpu' < / details > | < details > < summary > Expand...< / summary > < a href = "https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits" > https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv015" > https://avd.aquasec.com/appshield/ksv015< / a > < br > < / details > |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | < details > < summary > Expand...< / summary > When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' resources.requests.memory' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-resources-limits-memory/" > https://kubesec.io/basics/containers-resources-limits-memory/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv016" > https://avd.aquasec.com/appshield/ksv016< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv017" > https://avd.aquasec.com/appshield/ksv017< / a > < br > < / details > |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | < details > < summary > Expand...< / summary > Enforcing memory limits prevents DoS via resource exhaustion. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' resources.limits.memory' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-resources-limits-memory/" > https://kubesec.io/basics/containers-resources-limits-memory/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv018" > https://avd.aquasec.com/appshield/ksv018< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-iyuuplus' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-iyuuplus' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-iyuuplus' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | < details > < summary > Expand...< / summary > HostPath volumes must be forbidden. < br > < hr > < br > Deployment ' RELEASE-NAME-iyuuplus' should not set ' spec.template.volumes.hostPath' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv023" > https://avd.aquasec.com/appshield/ksv023< / a > < br > < / details > |
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root primary or supplementary GID. < br > < hr > < br > Deployment ' RELEASE-NAME-iyuuplus' should set ' spec.securityContext.runAsGroup' , ' spec.securityContext.supplementalGroups[*]' and ' spec.securityContext.fsGroup' to integer greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv029" > https://avd.aquasec.com/appshield/ksv029< / a > < br > < / details > |
## Containers
##### Detected Containers
2022-03-26 15:30:42 +00:00
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
2022-03-17 07:51:38 +00:00
tccr.io/truecharts/iyuuplus:latest@sha256:f1cf293763be6a0c14e48566d1fc8ad14d7057c7f04191b8ddbd86409bc33e0c
2022-03-15 17:44:22 +00:00
##### Scan Results
2022-03-26 15:30:42 +00:00
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
2022-03-15 18:22:06 +00:00
2022-03-15 17:44:22 +00:00
**alpine**
2022-03-15 18:22:06 +00:00
2022-03-30 20:23:21 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-03-31 13:59:34 +00:00
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/24/1" > https://www.openwall.com/lists/oss-security/2022/03/24/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/1" > https://www.openwall.com/lists/oss-security/2022/03/28/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/3" > https://www.openwall.com/lists/oss-security/2022/03/28/3< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
2022-03-26 15:30:42 +00:00
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
2022-03-15 18:22:06 +00:00
2022-03-15 17:44:22 +00:00
**alpine**
2022-03-15 18:22:06 +00:00
2022-03-30 20:23:21 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-03-31 13:59:34 +00:00
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/24/1" > https://www.openwall.com/lists/oss-security/2022/03/24/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/1" > https://www.openwall.com/lists/oss-security/2022/03/28/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/3" > https://www.openwall.com/lists/oss-security/2022/03/28/3< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
2022-03-17 07:51:38 +00:00
#### Container: tccr.io/truecharts/iyuuplus:latest@sha256:f1cf293763be6a0c14e48566d1fc8ad14d7057c7f04191b8ddbd86409bc33e0c (alpine 3.14.2)
2022-03-15 18:22:06 +00:00
2022-03-15 17:44:22 +00:00
**alpine**
2022-03-15 18:22:06 +00:00
2022-03-15 17:44:22 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-03-30 20:23:21 +00:00
| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42378" > https://access.redhat.com/security/cve/CVE-2021-42378< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42378" > https://nvd.nist.gov/vuln/detail/CVE-2021-42378< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42379" > https://access.redhat.com/security/cve/CVE-2021-42379< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42379" > https://nvd.nist.gov/vuln/detail/CVE-2021-42379< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42380" > https://access.redhat.com/security/cve/CVE-2021-42380< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42380" > https://nvd.nist.gov/vuln/detail/CVE-2021-42380< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42381" > https://access.redhat.com/security/cve/CVE-2021-42381< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42381" > https://nvd.nist.gov/vuln/detail/CVE-2021-42381< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42382" > https://access.redhat.com/security/cve/CVE-2021-42382< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42382" > https://nvd.nist.gov/vuln/detail/CVE-2021-42382< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42383" > https://access.redhat.com/security/cve/CVE-2021-42383< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42384" > https://access.redhat.com/security/cve/CVE-2021-42384< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42384" > https://nvd.nist.gov/vuln/detail/CVE-2021-42384< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42385" > https://access.redhat.com/security/cve/CVE-2021-42385< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42385" > https://nvd.nist.gov/vuln/detail/CVE-2021-42385< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42386" > https://access.redhat.com/security/cve/CVE-2021-42386< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42386" > https://nvd.nist.gov/vuln/detail/CVE-2021-42386< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42374" > https://access.redhat.com/security/cve/CVE-2021-42374< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42374" > https://nvd.nist.gov/vuln/detail/CVE-2021-42374< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42375" > https://access.redhat.com/security/cve/CVE-2021-42375< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22945" > https://access.redhat.com/security/cve/CVE-2021-22945< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22945.html" > https://curl.se/docs/CVE-2021-22945.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945< / a > < br > < a href = "https://hackerone.com/reports/1269242" > https://hackerone.com/reports/1269242< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" > https://nvd.nist.gov/vuln/detail/CVE-2021-22945< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22946" > https://access.redhat.com/security/cve/CVE-2021-22946< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22946.html" > https://curl.se/docs/CVE-2021-22946.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946< / a > < br > < a href = "https://hackerone.com/reports/1334111" > https://hackerone.com/reports/1334111< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22946.html" > https://linux.oracle.com/cve/CVE-2021-22946.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" > https://nvd.nist.gov/vuln/detail/CVE-2021-22946< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0008/" > https://security.netapp.com/advisory/ntap-20220121-0008/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22947" > https://access.redhat.com/security/cve/CVE-2021-22947< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22947.html" > https://curl.se/docs/CVE-2021-22947.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947< / a > < br > < a href = "https://hackerone.com/reports/1334763" > https://hackerone.com/reports/1334763< / a > < br > < a href = "https://launchpad.net/bugs/1944120 (regression bug)" > https://launchpad.net/bugs/1944120 (regression bug)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22947.html" > https://linux.oracle.com/cve/CVE-2021-22947.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" > https://nvd.nist.gov/vuln/detail/CVE-2021-22947< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-3" > https://ubuntu.com/security/notices/USN-5079-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-4" > https://ubuntu.com/security/notices/USN-5079-4< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| expat | CVE-2022-22822 | CRITICAL | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22822" > https://access.redhat.com/security/cve/CVE-2022-22822< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22822.html" > https://linux.oracle.com/cve/CVE-2022-22822.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22822" > https://nvd.nist.gov/vuln/detail/CVE-2022-22822< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-22823 | CRITICAL | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22823" > https://access.redhat.com/security/cve/CVE-2022-22823< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22823.html" > https://linux.oracle.com/cve/CVE-2022-22823.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22823" > https://nvd.nist.gov/vuln/detail/CVE-2022-22823< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-22824 | CRITICAL | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22824" > https://access.redhat.com/security/cve/CVE-2022-22824< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22824.html" > https://linux.oracle.com/cve/CVE-2022-22824.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22824" > https://nvd.nist.gov/vuln/detail/CVE-2022-22824< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-23852 | CRITICAL | 2.4.1-r0 | 2.4.4-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23852" > https://access.redhat.com/security/cve/CVE-2022-23852< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/550" > https://github.com/libexpat/libexpat/pull/550< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23852.html" > https://linux.oracle.com/cve/CVE-2022-23852.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23852" > https://nvd.nist.gov/vuln/detail/CVE-2022-23852< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220217-0001/" > https://security.netapp.com/advisory/ntap-20220217-0001/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-23990 | CRITICAL | 2.4.1-r0 | 2.4.4-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23990" > https://access.redhat.com/security/cve/CVE-2022-23990< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/551" > https://github.com/libexpat/libexpat/pull/551< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23990.html" > https://linux.oracle.com/cve/CVE-2022-23990.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9232.html" > https://linux.oracle.com/errata/ELSA-2022-9232.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23990" > https://nvd.nist.gov/vuln/detail/CVE-2022-23990< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-25235 | CRITICAL | 2.4.1-r0 | 2.4.5-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25235" > https://access.redhat.com/security/cve/CVE-2022-25235< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/562" > https://github.com/libexpat/libexpat/pull/562< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)" > https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)" > https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-25235.html" > https://linux.oracle.com/cve/CVE-2022-25235.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25235" > https://nvd.nist.gov/vuln/detail/CVE-2022-25235< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < / details > |
| expat | CVE-2022-25236 | CRITICAL | 2.4.1-r0 | 2.4.5-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25236" > https://access.redhat.com/security/cve/CVE-2022-25236< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/561" > https://github.com/libexpat/libexpat/pull/561< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)" > https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)" > https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/577" > https://github.com/libexpat/libexpat/pull/577< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-25236.html" > https://linux.oracle.com/cve/CVE-2022-25236.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25236" > https://nvd.nist.gov/vuln/detail/CVE-2022-25236< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < / details > |
| expat | CVE-2022-25315 | CRITICAL | 2.4.1-r0 | 2.4.5-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25315" > https://access.redhat.com/security/cve/CVE-2022-25315< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/559" > https://github.com/libexpat/libexpat/pull/559< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-25315.html" > https://linux.oracle.com/cve/CVE-2022-25315.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25315" > https://nvd.nist.gov/vuln/detail/CVE-2022-25315< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5320-1" > https://ubuntu.com/security/notices/USN-5320-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < / details > |
| expat | CVE-2021-45960 | HIGH | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-45960" > https://access.redhat.com/security/cve/CVE-2021-45960< / a > < br > < a href = "https://bugzilla.mozilla.org/show_bug.cgi?id=1217609" > https://bugzilla.mozilla.org/show_bug.cgi?id=1217609< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960< / a > < br > < a href = "https://github.com/libexpat/libexpat/issues/531" > https://github.com/libexpat/libexpat/issues/531< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/534" > https://github.com/libexpat/libexpat/pull/534< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea" > https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-45960.html" > https://linux.oracle.com/cve/CVE-2021-45960.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-45960" > https://nvd.nist.gov/vuln/detail/CVE-2021-45960< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0004/" > https://security.netapp.com/advisory/ntap-20220121-0004/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2021-46143 | HIGH | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-46143" > https://access.redhat.com/security/cve/CVE-2021-46143< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143< / a > < br > < a href = "https://github.com/libexpat/libexpat/issues/532" > https://github.com/libexpat/libexpat/issues/532< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/538" > https://github.com/libexpat/libexpat/pull/538< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46143.html" > https://linux.oracle.com/cve/CVE-2021-46143.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9227.html" > https://linux.oracle.com/errata/ELSA-2022-9227.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46143" > https://nvd.nist.gov/vuln/detail/CVE-2021-46143< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0006/" > https://security.netapp.com/advisory/ntap-20220121-0006/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-22825 | HIGH | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22825" > https://access.redhat.com/security/cve/CVE-2022-22825< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22825.html" > https://linux.oracle.com/cve/CVE-2022-22825.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22825" > https://nvd.nist.gov/vuln/detail/CVE-2022-22825< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-22826 | HIGH | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22826" > https://access.redhat.com/security/cve/CVE-2022-22826< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22826.html" > https://linux.oracle.com/cve/CVE-2022-22826.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22826" > https://nvd.nist.gov/vuln/detail/CVE-2022-22826< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-22827 | HIGH | 2.4.1-r0 | 2.4.3-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/17/3" > http://www.openwall.com/lists/oss-security/2022/01/17/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-22827" > https://access.redhat.com/security/cve/CVE-2022-22827< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/539" > https://github.com/libexpat/libexpat/pull/539< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22827.html" > https://linux.oracle.com/cve/CVE-2022-22827.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1069.html" > https://linux.oracle.com/errata/ELSA-2022-1069.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22827" > https://nvd.nist.gov/vuln/detail/CVE-2022-22827< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5288-1" > https://ubuntu.com/security/notices/USN-5288-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5073" > https://www.debian.org/security/2022/dsa-5073< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-05" > https://www.tenable.com/security/tns-2022-05< / a > < br > < / details > |
| expat | CVE-2022-25314 | HIGH | 2.4.1-r0 | 2.4.5-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25314" > https://access.redhat.com/security/cve/CVE-2022-25314< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/560" > https://github.com/libexpat/libexpat/pull/560< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25314" > https://nvd.nist.gov/vuln/detail/CVE-2022-25314< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5320-1" > https://ubuntu.com/security/notices/USN-5320-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < / details > |
| expat | CVE-2022-25313 | MEDIUM | 2.4.1-r0 | 2.4.5-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/02/19/1" > http://www.openwall.com/lists/oss-security/2022/02/19/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-25313" > https://access.redhat.com/security/cve/CVE-2022-25313< / a > < br > < a href = "https://blog.hartwork.org/posts/expat-2-4-5-released/" > https://blog.hartwork.org/posts/expat-2-4-5-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313< / a > < br > < a href = "https://github.com/libexpat/libexpat/pull/558" > https://github.com/libexpat/libexpat/pull/558< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25313" > https://nvd.nist.gov/vuln/detail/CVE-2022-25313< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0008/" > https://security.netapp.com/advisory/ntap-20220303-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5320-1" > https://ubuntu.com/security/notices/USN-5320-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5085" > https://www.debian.org/security/2022/dsa-5085< / a > < br > < / details > |
2022-03-31 13:59:34 +00:00
| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22945" > https://access.redhat.com/security/cve/CVE-2021-22945< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22945.html" > https://curl.se/docs/CVE-2021-22945.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945< / a > < br > < a href = "https://hackerone.com/reports/1269242" > https://hackerone.com/reports/1269242< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" > https://nvd.nist.gov/vuln/detail/CVE-2021-22945< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22946" > https://access.redhat.com/security/cve/CVE-2021-22946< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22946.html" > https://curl.se/docs/CVE-2021-22946.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946< / a > < br > < a href = "https://hackerone.com/reports/1334111" > https://hackerone.com/reports/1334111< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22946.html" > https://linux.oracle.com/cve/CVE-2021-22946.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" > https://nvd.nist.gov/vuln/detail/CVE-2021-22946< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0008/" > https://security.netapp.com/advisory/ntap-20220121-0008/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22947" > https://access.redhat.com/security/cve/CVE-2021-22947< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22947.html" > https://curl.se/docs/CVE-2021-22947.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947< / a > < br > < a href = "https://hackerone.com/reports/1334763" > https://hackerone.com/reports/1334763< / a > < br > < a href = "https://launchpad.net/bugs/1944120 (regression bug)" > https://launchpad.net/bugs/1944120 (regression bug)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22947.html" > https://linux.oracle.com/cve/CVE-2021-22947.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" > https://nvd.nist.gov/vuln/detail/CVE-2021-22947< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-3" > https://ubuntu.com/security/notices/USN-5079-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-4" > https://ubuntu.com/security/notices/USN-5079-4< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-31 13:59:34 +00:00
| libressl | CVE-2022-0778 | HIGH | 3.3.3-r0 | 3.3.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
| libressl3.3-libcrypto | CVE-2022-0778 | HIGH | 3.3.3-r0 | 3.3.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
| libressl3.3-libssl | CVE-2022-0778 | HIGH | 3.3.3-r0 | 3.3.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
| libressl3.3-libtls | CVE-2022-0778 | HIGH | 3.3.3-r0 | 3.3.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
| libretls | CVE-2022-0778 | HIGH | 3.3.3p1-r2 | 3.3.3p1-r3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libxml2 | CVE-2022-23308 | HIGH | 2.9.12-r1 | 2.9.13-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23308" > https://access.redhat.com/security/cve/CVE-2022-23308< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308< / a > < br > < a href = "https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e" > https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e< / a > < br > < a href = "https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS" > https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23308.html" > https://linux.oracle.com/cve/CVE-2022-23308.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0899.html" > https://linux.oracle.com/errata/ELSA-2022-0899.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" > https://nvd.nist.gov/vuln/detail/CVE-2022-23308< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5324-1" > https://ubuntu.com/security/notices/USN-5324-1< / a > < br > < / details > |
2022-03-31 13:59:34 +00:00
| openssl | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9249.html" > https://linux.oracle.com/errata/ELSA-2022-9249.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-1" > https://ubuntu.com/security/notices/USN-5328-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5328-2" > https://ubuntu.com/security/notices/USN-5328-2< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5103" > https://www.debian.org/security/2022/dsa-5103< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220315.txt" > https://www.openssl.org/news/secadv/20220315.txt< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-06" > https://www.tenable.com/security/tns-2022-06< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7 | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7 | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7 | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-common | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-common | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-common | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-curl | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-curl | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-curl | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-dom | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-dom | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-dom | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-json | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-json | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-json | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-mbstring | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-mbstring | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-mbstring | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-opcache | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-opcache | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-opcache | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-openssl | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-openssl | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-openssl | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-pcntl | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-pcntl | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-pcntl | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-pdo | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-pdo | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-pdo | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-pdo_sqlite | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-pdo_sqlite | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-pdo_sqlite | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-phar | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-phar | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-phar | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-posix | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-posix | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-posix | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-session | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-session | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-session | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-simplexml | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-simplexml | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-simplexml | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-sockets | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-sockets | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-sockets | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-xml | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-xml | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-xml | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| php7-zip | CVE-2021-21703 | HIGH | 7.4.23-r0 | 7.4.25-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/10/26/7" > http://www.openwall.com/lists/oss-security/2021/10/26/7< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-21703" > https://access.redhat.com/security/cve/CVE-2021-21703< / a > < br > < a href = "https://bugs.php.net/bug.php?id=81026" > https://bugs.php.net/bug.php?id=81026< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703< / a > < br > < a href = "https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b" > https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21703" > https://nvd.nist.gov/vuln/detail/CVE-2021-21703< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211118-0003/" > https://security.netapp.com/advisory/ntap-20211118-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5125-1" > https://ubuntu.com/security/notices/USN-5125-1< / a > < br > < a href = "https://www.ambionics.io/blog/php-fpm-local-root" > https://www.ambionics.io/blog/php-fpm-local-root< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4992" > https://www.debian.org/security/2021/dsa-4992< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4993" > https://www.debian.org/security/2021/dsa-4993< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-03-15 17:44:22 +00:00
| php7-zip | CVE-2021-21706 | MEDIUM | 7.4.23-r0 | 7.4.24-r0 | < details > < summary > Expand...< / summary > < a href = "https://bugs.php.net/bug.php?id=81420" > https://bugs.php.net/bug.php?id=81420< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0007/" > https://security.netapp.com/advisory/ntap-20211029-0007/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| php7-zip | CVE-2021-21707 | MEDIUM | 7.4.23-r0 | 7.4.26-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-21707" > https://access.redhat.com/security/cve/CVE-2021-21707< / a > < br > < a href = "https://bugs.php.net/bug.php?id=79971" > https://bugs.php.net/bug.php?id=79971< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21707" > https://nvd.nist.gov/vuln/detail/CVE-2021-21707< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0005/" > https://security.netapp.com/advisory/ntap-20211223-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-1" > https://ubuntu.com/security/notices/USN-5300-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-2" > https://ubuntu.com/security/notices/USN-5300-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5300-3" > https://ubuntu.com/security/notices/USN-5300-3< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5082" > https://www.debian.org/security/2022/dsa-5082< / a > < br > < / details > |
| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42378" > https://access.redhat.com/security/cve/CVE-2021-42378< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42378" > https://nvd.nist.gov/vuln/detail/CVE-2021-42378< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42379" > https://access.redhat.com/security/cve/CVE-2021-42379< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42379" > https://nvd.nist.gov/vuln/detail/CVE-2021-42379< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42380" > https://access.redhat.com/security/cve/CVE-2021-42380< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42380" > https://nvd.nist.gov/vuln/detail/CVE-2021-42380< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42381" > https://access.redhat.com/security/cve/CVE-2021-42381< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42381" > https://nvd.nist.gov/vuln/detail/CVE-2021-42381< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42382" > https://access.redhat.com/security/cve/CVE-2021-42382< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42382" > https://nvd.nist.gov/vuln/detail/CVE-2021-42382< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42383" > https://access.redhat.com/security/cve/CVE-2021-42383< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42384" > https://access.redhat.com/security/cve/CVE-2021-42384< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42384" > https://nvd.nist.gov/vuln/detail/CVE-2021-42384< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42385" > https://access.redhat.com/security/cve/CVE-2021-42385< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42385" > https://nvd.nist.gov/vuln/detail/CVE-2021-42385< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42386" > https://access.redhat.com/security/cve/CVE-2021-42386< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42386" > https://nvd.nist.gov/vuln/detail/CVE-2021-42386< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42374" > https://access.redhat.com/security/cve/CVE-2021-42374< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42374" > https://nvd.nist.gov/vuln/detail/CVE-2021-42374< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42375" > https://access.redhat.com/security/cve/CVE-2021-42375< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
2022-03-31 13:59:34 +00:00
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/24/1" > https://www.openwall.com/lists/oss-security/2022/03/24/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/1" > https://www.openwall.com/lists/oss-security/2022/03/28/1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/03/28/3" > https://www.openwall.com/lists/oss-security/2022/03/28/3< / a > < br > < / details > |