---
hide:
- toc
---
# Security Overview
## Helm-Chart
##### Scan Results
#### Chart Object: bitcoinunlimited/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | Expand...
A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.allowPrivilegeEscalation' to false | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
|
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Expand...
The container should drop all default capabilities and add only those that are needed for its execution.
Container 'RELEASE-NAME-bitcoinunlimited' of Deployment 'RELEASE-NAME-bitcoinunlimited' should add 'ALL' to 'securityContext.capabilities.drop' | Expand...
https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
|
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Expand...
The container should drop all default capabilities and add only those that are needed for its execution.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should add 'ALL' to 'securityContext.capabilities.drop' | Expand...
https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
|
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | Expand...
Enforcing CPU limits prevents DoS via resource exhaustion.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'resources.limits.cpu' | Expand...
https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'RELEASE-NAME-bitcoinunlimited' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'autopermissions' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | Expand...
It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.
Container 'RELEASE-NAME-bitcoinunlimited' of Deployment 'RELEASE-NAME-bitcoinunlimited' should specify an image tag | Expand...
https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
|
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'RELEASE-NAME-bitcoinunlimited' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'autopermissions' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | Expand...
When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'resources.requests.cpu' | Expand...
https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
|
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | Expand...
When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'resources.requests.memory' | Expand...
https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
|
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | Expand...
Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.privileged' to false | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
|
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | Expand...
Enforcing memory limits prevents DoS via resource exhaustion.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'resources.limits.memory' | Expand...
https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
|
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | Expand...
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.
Container 'RELEASE-NAME-bitcoinunlimited' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsUser' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
|
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | Expand...
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.
Container 'autopermissions' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsUser' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
|
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | Expand...
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsUser' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
|
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | Expand...
Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.
Container 'RELEASE-NAME-bitcoinunlimited' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsGroup' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
|
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | Expand...
Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.
Container 'autopermissions' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsGroup' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
|
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | Expand...
Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.
Container 'hostpatch' of Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'securityContext.runAsGroup' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
|
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | Expand...
HostPath volumes must be forbidden.
Deployment 'RELEASE-NAME-bitcoinunlimited' should not set 'spec.template.volumes.hostPath' | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
|
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | Expand...
Containers should be forbidden from running with a root primary or supplementary GID.
Deployment 'RELEASE-NAME-bitcoinunlimited' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0 | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
|
## Containers
##### Detected Containers
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/bitcoinunlimited:latest
##### Scan Results
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | Expand...
https://access.redhat.com/security/cve/CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
|
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
|
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | Expand...
https://access.redhat.com/security/cve/CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
|
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | Expand...
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-1642.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | Expand...
https://access.redhat.com/security/cve/CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
|
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
|
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | Expand...
https://access.redhat.com/security/cve/CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
|
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | Expand...
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-1642.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|
#### Container: tccr.io/truecharts/bitcoinunlimited:latest (debian 9.3)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2019-3462 | HIGH | 1.4.8 | 1.4.9 | Expand...
http://www.securityfocus.com/bid/106690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://security.netapp.com/advisory/ntap-20190125-0002/
https://ubuntu.com/security/notices/USN-3863-1
https://ubuntu.com/security/notices/USN-3863-2
https://usn.ubuntu.com/3863-1/
https://usn.ubuntu.com/3863-2/
https://www.debian.org/security/2019/dsa-4371
|
| apt | CVE-2020-27350 | MEDIUM | 1.4.8 | 1.4.11 | Expand...
https://access.redhat.com/security/cve/CVE-2020-27350
https://bugs.launchpad.net/bugs/1899193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27350
https://security.netapp.com/advisory/ntap-20210108-0005/
https://ubuntu.com/security/notices/USN-4667-1
https://ubuntu.com/security/notices/USN-4667-2
https://usn.ubuntu.com/usn/usn-4667-1
https://www.debian.org/security/2020/dsa-4808
|
| apt | CVE-2020-3810 | MEDIUM | 1.4.8 | 1.4.10 | Expand...
https://bugs.launchpad.net/bugs/1878177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3810
https://github.com/Debian/apt/issues/111
https://github.com/julian-klode/apt/commit/de4efadc3c92e26d37272fd310be148ec61dcf36
https://lists.debian.org/debian-security-announce/2020/msg00089.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4PEH357MZM2SUGKETMEHMSGQS652QHH/
https://salsa.debian.org/apt-team/apt/-/commit/dceb1e49e4b8e4dadaf056be34088b415939cda6
https://salsa.debian.org/jak/apt/-/commit/dceb1e49e4b8e4dadaf056be34088b415939cda6
https://tracker.debian.org/news/1144109/accepted-apt-212-source-into-unstable/
https://ubuntu.com/security/notices/USN-4359-1
https://ubuntu.com/security/notices/USN-4359-2
https://usn.ubuntu.com/4359-1/
https://usn.ubuntu.com/4359-2/
|
| apt | CVE-2011-3374 | LOW | 1.4.8 | | Expand...
https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
|
| bash | CVE-2019-18276 | LOW | 4.4-5 | | Expand...
http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
|
| bsdutils | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| bsdutils | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| bsdutils | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| bsdutils | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| ca-certificates | DLA-2593-1 | UNKNOWN | 20161130+nmu1 | 20200601~deb9u2 | Expand...
|
| coreutils | CVE-2016-2781 | LOW | 8.26-3 | | Expand...
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
|
| coreutils | CVE-2017-18018 | LOW | 8.26-3 | | Expand...
http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
|
| debian-archive-keyring | DLA-2948-1 | UNKNOWN | 2017.5 | 2017.5+deb9u2 | Expand...
|
| dirmngr | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
|
| dirmngr | CVE-2018-12020 | HIGH | 2.1.18-8~deb9u1 | 2.1.18-8~deb9u2 | Expand...
http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://access.redhat.com/security/cve/CVE-2018-12020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
https://dev.gnupg.org/T4012
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-12020.html
https://linux.oracle.com/errata/ELSA-2018-2181.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://neopg.io/blog/gpg-signature-spoof/
https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
https://ubuntu.com/security/notices/USN-3675-1
https://ubuntu.com/security/notices/USN-3675-2
https://ubuntu.com/security/notices/USN-3675-3
https://ubuntu.com/security/notices/USN-3964-1
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224
|
| dirmngr | CVE-2018-9234 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
|
| dirmngr | CVE-2019-14855 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
|
| e2fslibs | CVE-2022-1304 | HIGH | 1.43.4-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
|
| e2fslibs | CVE-2019-5094 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
|
| e2fslibs | CVE-2019-5188 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
|
| e2fsprogs | CVE-2022-1304 | HIGH | 1.43.4-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
|
| e2fsprogs | CVE-2019-5094 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
|
| e2fsprogs | CVE-2019-5188 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
|
| gcc-6-base | CVE-2018-12886 | HIGH | 6.3.0-18 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
|
| gcc-6-base | DSA-4121-1 | UNKNOWN | 6.3.0-18 | 6.3.0-18+deb9u1 | Expand...
|
| gnupg | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
|
| gnupg | CVE-2018-12020 | HIGH | 2.1.18-8~deb9u1 | 2.1.18-8~deb9u2 | Expand...
http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://access.redhat.com/security/cve/CVE-2018-12020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
https://dev.gnupg.org/T4012
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-12020.html
https://linux.oracle.com/errata/ELSA-2018-2181.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://neopg.io/blog/gpg-signature-spoof/
https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
https://ubuntu.com/security/notices/USN-3675-1
https://ubuntu.com/security/notices/USN-3675-2
https://ubuntu.com/security/notices/USN-3675-3
https://ubuntu.com/security/notices/USN-3964-1
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224
|
| gnupg | CVE-2018-9234 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
|
| gnupg | CVE-2019-14855 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
|
| gnupg-agent | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
|
| gnupg-agent | CVE-2018-12020 | HIGH | 2.1.18-8~deb9u1 | 2.1.18-8~deb9u2 | Expand...
http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://access.redhat.com/security/cve/CVE-2018-12020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
https://dev.gnupg.org/T4012
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-12020.html
https://linux.oracle.com/errata/ELSA-2018-2181.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://neopg.io/blog/gpg-signature-spoof/
https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
https://ubuntu.com/security/notices/USN-3675-1
https://ubuntu.com/security/notices/USN-3675-2
https://ubuntu.com/security/notices/USN-3675-3
https://ubuntu.com/security/notices/USN-3964-1
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224
|
| gnupg-agent | CVE-2018-9234 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
|
| gnupg-agent | CVE-2019-14855 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
|
| gpgv | CVE-2018-1000858 | HIGH | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
|
| gpgv | CVE-2018-12020 | HIGH | 2.1.18-8~deb9u1 | 2.1.18-8~deb9u2 | Expand...
http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://access.redhat.com/security/cve/CVE-2018-12020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
https://dev.gnupg.org/T4012
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-12020.html
https://linux.oracle.com/errata/ELSA-2018-2181.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://neopg.io/blog/gpg-signature-spoof/
https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
https://ubuntu.com/security/notices/USN-3675-1
https://ubuntu.com/security/notices/USN-3675-2
https://ubuntu.com/security/notices/USN-3675-3
https://ubuntu.com/security/notices/USN-3964-1
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224
|
| gpgv | CVE-2018-9234 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
|
| gpgv | CVE-2019-14855 | LOW | 2.1.18-8~deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
|
| gzip | CVE-2022-1271 | HIGH | 1.6-5 | 1.6-5+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-1537.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
|
| libapt-pkg5.0 | CVE-2019-3462 | HIGH | 1.4.8 | 1.4.9 | Expand...
http://www.securityfocus.com/bid/106690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://security.netapp.com/advisory/ntap-20190125-0002/
https://ubuntu.com/security/notices/USN-3863-1
https://ubuntu.com/security/notices/USN-3863-2
https://usn.ubuntu.com/3863-1/
https://usn.ubuntu.com/3863-2/
https://www.debian.org/security/2019/dsa-4371
|
| libapt-pkg5.0 | CVE-2020-27350 | MEDIUM | 1.4.8 | 1.4.11 | Expand...
https://access.redhat.com/security/cve/CVE-2020-27350
https://bugs.launchpad.net/bugs/1899193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27350
https://security.netapp.com/advisory/ntap-20210108-0005/
https://ubuntu.com/security/notices/USN-4667-1
https://ubuntu.com/security/notices/USN-4667-2
https://usn.ubuntu.com/usn/usn-4667-1
https://www.debian.org/security/2020/dsa-4808
|
| libapt-pkg5.0 | CVE-2020-3810 | MEDIUM | 1.4.8 | 1.4.10 | Expand...
https://bugs.launchpad.net/bugs/1878177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3810
https://github.com/Debian/apt/issues/111
https://github.com/julian-klode/apt/commit/de4efadc3c92e26d37272fd310be148ec61dcf36
https://lists.debian.org/debian-security-announce/2020/msg00089.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4PEH357MZM2SUGKETMEHMSGQS652QHH/
https://salsa.debian.org/apt-team/apt/-/commit/dceb1e49e4b8e4dadaf056be34088b415939cda6
https://salsa.debian.org/jak/apt/-/commit/dceb1e49e4b8e4dadaf056be34088b415939cda6
https://tracker.debian.org/news/1144109/accepted-apt-212-source-into-unstable/
https://ubuntu.com/security/notices/USN-4359-1
https://ubuntu.com/security/notices/USN-4359-2
https://usn.ubuntu.com/4359-1/
https://usn.ubuntu.com/4359-2/
|
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.4.8 | | Expand...
https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
|
| libblkid1 | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| libblkid1 | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| libblkid1 | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libblkid1 | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libbz2-1.0 | CVE-2019-12900 | CRITICAL | 1.0.6-8.1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libc-bin | CVE-2017-18269 | CRITICAL | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
https://access.redhat.com/security/cve/CVE-2017-18269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269
https://github.com/fingolfin/memmove-bug
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=22644
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc-bin | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u1 | | Expand...
http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libc-bin | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
|
| libc-bin | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libc-bin | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| libc-bin | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
|
| libc-bin | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
|
| libc-bin | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
|
| libc-bin | CVE-2009-5155 | HIGH | 2.24-11+deb9u1 | | Expand...
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
|
| libc-bin | CVE-2017-1000408 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
https://access.redhat.com/security/cve/CVE-2017-1000408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
|
| libc-bin | CVE-2017-1000409 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
https://access.redhat.com/security/cve/CVE-2017-1000409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
|
| libc-bin | CVE-2017-16997 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/102228
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2017-16997
https://bugs.debian.org/884615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
https://linux.oracle.com/cve/CVE-2017-16997.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22625
https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
https://ubuntu.com/security/notices/USN-3534-1
|
| libc-bin | CVE-2018-1000001 | HIGH | 2.24-11+deb9u1 | | Expand...
http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
|
| libc-bin | CVE-2020-1751 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc-bin | CVE-2020-1752 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc-bin | CVE-2021-3326 | HIGH | 2.24-11+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libc-bin | CVE-2021-3999 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| libc-bin | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
|
| libc-bin | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
|
| libc-bin | CVE-2017-12133 | MEDIUM | 2.24-11+deb9u1 | 2.24-11+deb9u2 | Expand...
https://access.redhat.com/security/cve/CVE-2017-12133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/
https://sourceware.org/bugzilla/show_bug.cgi?id=21115
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.securityfocus.com/bid/100679
|
| libc-bin | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libc-bin | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc-bin | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libc-bin | CVE-2010-4756 | LOW | 2.24-11+deb9u1 | | Expand...
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
|
| libc-bin | CVE-2015-8985 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
|
| libc-bin | CVE-2016-10228 | LOW | 2.24-11+deb9u1 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libc-bin | CVE-2017-15670 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101521
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
https://linux.oracle.com/cve/CVE-2017-15670.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22320
https://ubuntu.com/security/notices/USN-3534-1
|
| libc-bin | CVE-2017-15671 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| libc-bin | CVE-2017-15804 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101535
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
https://linux.oracle.com/cve/CVE-2017-15804.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
https://ubuntu.com/security/notices/USN-3534-1
|
| libc-bin | CVE-2018-11236 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/104255
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-11236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236
https://linux.oracle.com/cve/CVE-2018-11236.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=22786
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libc-bin | CVE-2018-11237 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/104256
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-11237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237
https://linux.oracle.com/cve/CVE-2018-11237.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23196
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.exploit-db.com/exploits/44750/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libc-bin | CVE-2018-20796 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
| libc-bin | CVE-2019-1010022 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
|
| libc-bin | CVE-2019-1010023 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
|
| libc-bin | CVE-2019-1010024 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
|
| libc-bin | CVE-2019-1010025 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
|
| libc-bin | CVE-2019-19126 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc-bin | CVE-2019-6488 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
|
| libc-bin | CVE-2019-7309 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
|
| libc-bin | CVE-2019-9192 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
| libc-bin | CVE-2020-6096 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
| libc-bin | CVE-2021-27645 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
|
| libc6 | CVE-2017-18269 | CRITICAL | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
https://access.redhat.com/security/cve/CVE-2017-18269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269
https://github.com/fingolfin/memmove-bug
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=22644
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc6 | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u1 | | Expand...
http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libc6 | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
|
| libc6 | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libc6 | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| libc6 | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
|
| libc6 | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
|
| libc6 | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
|
| libc6 | CVE-2009-5155 | HIGH | 2.24-11+deb9u1 | | Expand...
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
|
| libc6 | CVE-2017-1000408 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
https://access.redhat.com/security/cve/CVE-2017-1000408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
|
| libc6 | CVE-2017-1000409 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
https://access.redhat.com/security/cve/CVE-2017-1000409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
|
| libc6 | CVE-2017-16997 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/102228
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2017-16997
https://bugs.debian.org/884615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
https://linux.oracle.com/cve/CVE-2017-16997.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22625
https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
https://ubuntu.com/security/notices/USN-3534-1
|
| libc6 | CVE-2018-1000001 | HIGH | 2.24-11+deb9u1 | | Expand...
http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
|
| libc6 | CVE-2020-1751 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc6 | CVE-2020-1752 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc6 | CVE-2021-3326 | HIGH | 2.24-11+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libc6 | CVE-2021-3999 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| libc6 | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
|
| libc6 | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
|
| libc6 | CVE-2017-12133 | MEDIUM | 2.24-11+deb9u1 | 2.24-11+deb9u2 | Expand...
https://access.redhat.com/security/cve/CVE-2017-12133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/
https://sourceware.org/bugzilla/show_bug.cgi?id=21115
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.securityfocus.com/bid/100679
|
| libc6 | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libc6 | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc6 | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libc6 | CVE-2010-4756 | LOW | 2.24-11+deb9u1 | | Expand...
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
|
| libc6 | CVE-2015-8985 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
|
| libc6 | CVE-2016-10228 | LOW | 2.24-11+deb9u1 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libc6 | CVE-2017-15670 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101521
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
https://linux.oracle.com/cve/CVE-2017-15670.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22320
https://ubuntu.com/security/notices/USN-3534-1
|
| libc6 | CVE-2017-15671 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| libc6 | CVE-2017-15804 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101535
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
https://linux.oracle.com/cve/CVE-2017-15804.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
https://ubuntu.com/security/notices/USN-3534-1
|
| libc6 | CVE-2018-11236 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/104255
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-11236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236
https://linux.oracle.com/cve/CVE-2018-11236.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=22786
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libc6 | CVE-2018-11237 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/104256
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-11237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237
https://linux.oracle.com/cve/CVE-2018-11237.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23196
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.exploit-db.com/exploits/44750/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libc6 | CVE-2018-20796 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
| libc6 | CVE-2019-1010022 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
|
| libc6 | CVE-2019-1010023 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
|
| libc6 | CVE-2019-1010024 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
|
| libc6 | CVE-2019-1010025 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
|
| libc6 | CVE-2019-19126 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| libc6 | CVE-2019-6488 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
|
| libc6 | CVE-2019-7309 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
|
| libc6 | CVE-2019-9192 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
| libc6 | CVE-2020-6096 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
| libc6 | CVE-2021-27645 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
|
| libcomerr2 | CVE-2022-1304 | HIGH | 1.43.4-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
|
| libcomerr2 | CVE-2019-5094 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
|
| libcomerr2 | CVE-2019-5188 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
|
| libfdisk1 | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| libfdisk1 | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| libfdisk1 | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libfdisk1 | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libgcc1 | CVE-2018-12886 | HIGH | 6.3.0-18 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
|
| libgcc1 | DSA-4121-1 | UNKNOWN | 6.3.0-18 | 6.3.0-18+deb9u1 | Expand...
|
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.7.6-2+deb9u2 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgcrypt20 | CVE-2018-0495 | MEDIUM | 1.7.6-2+deb9u2 | 1.7.6-2+deb9u3 | Expand...
http://www.securitytracker.com/id/1041144
http://www.securitytracker.com/id/1041147
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:2237
https://access.redhat.com/security/cve/CVE-2018-0495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495
https://dev.gnupg.org/T4011
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965
https://linux.oracle.com/cve/CVE-2018-0495.html
https://linux.oracle.com/errata/ELSA-2019-2237.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
https://ubuntu.com/security/notices/USN-3689-1
https://ubuntu.com/security/notices/USN-3689-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://ubuntu.com/security/notices/USN-3850-1
https://ubuntu.com/security/notices/USN-3850-2
https://usn.ubuntu.com/3689-1/
https://usn.ubuntu.com/3689-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://usn.ubuntu.com/3850-1/
https://usn.ubuntu.com/3850-2/
https://www.debian.org/security/2018/dsa-4231
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.7.6-2+deb9u2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
|
| libgcrypt20 | CVE-2021-40528 | MEDIUM | 1.7.6-2+deb9u2 | 1.7.6-2+deb9u4 | Expand...
https://access.redhat.com/security/cve/CVE-2021-40528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://nvd.nist.gov/vuln/detail/CVE-2021-40528
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
|
| libgcrypt20 | CVE-2018-6829 | LOW | 1.7.6-2+deb9u2 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
|
| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-1 | 2:6.1.2+dfsg-1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
|
| libgnutls30 | CVE-2019-3829 | HIGH | 3.5.8-5+deb9u3 | 3.5.8-5+deb9u5 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
https://access.redhat.com/errata/RHSA-2019:3600
https://access.redhat.com/security/cve/CVE-2019-3829
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
https://gitlab.com/gnutls/gnutls/issues/694
https://linux.oracle.com/cve/CVE-2019-3829.html
https://linux.oracle.com/errata/ELSA-2019-3600.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html
https://security.gentoo.org/glsa/201904-14
https://security.netapp.com/advisory/ntap-20190619-0004/
https://ubuntu.com/security/notices/USN-3999-1
https://usn.ubuntu.com/3999-1/
https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
|
| libgnutls30 | CVE-2018-10844 | MEDIUM | 3.5.8-5+deb9u3 | 3.5.8-5+deb9u4 | Expand...
http://www.securityfocus.com/bid/105138
https://access.redhat.com/errata/RHSA-2018:3050
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/security/cve/CVE-2018-10844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
https://eprint.iacr.org/2018/747
https://gitlab.com/gnutls/gnutls/merge_requests/657
https://linux.oracle.com/cve/CVE-2018-10844.html
https://linux.oracle.com/errata/ELSA-2018-3050.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
https://ubuntu.com/security/notices/USN-3999-1
https://usn.ubuntu.com/3999-1/
|
| libgnutls30 | CVE-2018-10845 | MEDIUM | 3.5.8-5+deb9u3 | 3.5.8-5+deb9u4 | Expand...
http://www.securityfocus.com/bid/105138
https://access.redhat.com/errata/RHSA-2018:3050
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/security/cve/CVE-2018-10845
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
https://eprint.iacr.org/2018/747
https://gitlab.com/gnutls/gnutls/merge_requests/657
https://linux.oracle.com/cve/CVE-2018-10845.html
https://linux.oracle.com/errata/ELSA-2018-3050.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
https://ubuntu.com/security/notices/USN-3999-1
https://usn.ubuntu.com/3999-1/
|
| libgnutls30 | CVE-2018-10846 | MEDIUM | 3.5.8-5+deb9u3 | 3.5.8-5+deb9u4 | Expand...
http://www.securityfocus.com/bid/105138
https://access.redhat.com/errata/RHSA-2018:3050
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/security/cve/CVE-2018-10846
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
https://eprint.iacr.org/2018/747
https://gitlab.com/gnutls/gnutls/merge_requests/657
https://linux.oracle.com/cve/CVE-2018-10846.html
https://linux.oracle.com/errata/ELSA-2018-3050.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
https://ubuntu.com/security/notices/USN-3999-1
https://usn.ubuntu.com/3999-1/
|
| libgnutls30 | CVE-2018-16868 | MEDIUM | 3.5.8-5+deb9u3 | | Expand...
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
|
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.5.8-5+deb9u3 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-4209
|
| libgnutls30 | CVE-2011-3389 | LOW | 3.5.8-5+deb9u3 | | Expand...
http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
|
| libgnutls30 | DLA-2759-1 | UNKNOWN | 3.5.8-5+deb9u3 | 3.5.8-5+deb9u6 | Expand...
|
| libhogweed4 | CVE-2021-20305 | HIGH | 3.3-1 | 3.3-1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2021-20305
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
https://linux.oracle.com/cve/CVE-2021-20305.html
https://linux.oracle.com/errata/ELSA-2021-1206.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
https://security.gentoo.org/glsa/202105-31
https://security.netapp.com/advisory/ntap-20211022-0002/
https://ubuntu.com/security/notices/USN-4906-1
https://www.debian.org/security/2021/dsa-4933
|
| libhogweed4 | CVE-2021-3580 | HIGH | 3.3-1 | 3.3-1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
|
| libhogweed4 | CVE-2018-16869 | MEDIUM | 3.3-1 | | Expand...
http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://ubuntu.com/security/notices/USN-4990-1
|
| libidn11 | CVE-2017-14062 | CRITICAL | 1.33-1 | 1.33-1+deb9u1 | Expand...
http://www.debian.org/security/2017/dsa-3988
https://access.redhat.com/security/cve/CVE-2017-14062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
https://gitlab.com/libidn/libidn2/blob/master/NEWS
https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
https://ubuntu.com/security/notices/USN-3421-1
https://ubuntu.com/security/notices/USN-3434-1
https://ubuntu.com/security/notices/USN-3434-2
|
| libldap-2.4-2 | CVE-2020-12243 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u4 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html
https://access.redhat.com/security/cve/CVE-2020-12243
https://bugs.openldap.org/show_bug.cgi?id=9202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243
https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES
https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440
https://linux.oracle.com/cve/CVE-2020-12243.html
https://linux.oracle.com/errata/ELSA-2020-4041.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html
https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/
https://security.netapp.com/advisory/ntap-20200511-0003/
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4352-1
https://ubuntu.com/security/notices/USN-4352-2
https://usn.ubuntu.com/4352-1/
https://usn.ubuntu.com/4352-2/
https://www.debian.org/security/2020/dsa-4666
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libldap-2.4-2 | CVE-2020-25692 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u5 | Expand...
https://access.redhat.com/security/cve/CVE-2020-25692
https://bugzilla.redhat.com/show_bug.cgi?id=1894567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692
https://linux.oracle.com/cve/CVE-2020-25692.html
https://linux.oracle.com/errata/ELSA-2021-1389.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25692
https://security.netapp.com/advisory/ntap-20210108-0006/
https://ubuntu.com/security/notices/USN-4622-1
https://ubuntu.com/security/notices/USN-4622-2
|
| libldap-2.4-2 | CVE-2020-25709 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u6 | Expand...
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2020-25709
https://bugzilla.redhat.com/show_bug.cgi?id=1899675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25709.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
|
| libldap-2.4-2 | CVE-2020-25710 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u6 | Expand...
https://access.redhat.com/security/cve/CVE-2020-25710
https://bugzilla.redhat.com/show_bug.cgi?id=1899678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25710.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
|
| libldap-2.4-2 | CVE-2020-36221 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36221
https://bugs.openldap.org/show_bug.cgi?id=9404
https://bugs.openldap.org/show_bug.cgi?id=9424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221
https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31
https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36221
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36222 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36222
https://bugs.openldap.org/show_bug.cgi?id=9406
https://bugs.openldap.org/show_bug.cgi?id=9407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36222
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36223 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36223
https://bugs.openldap.org/show_bug.cgi?id=9408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36224 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36224
https://bugs.openldap.org/show_bug.cgi?id=9409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36225 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36225
https://bugs.openldap.org/show_bug.cgi?id=9412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36225
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36226 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36226
https://bugs.openldap.org/show_bug.cgi?id=9413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36226
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36227 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36227
https://bugs.openldap.org/show_bug.cgi?id=9428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227
https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36227
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36228 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36228
https://bugs.openldap.org/show_bug.cgi?id=9427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228
https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36228
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36229 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36229
https://bugs.openldap.org/show_bug.cgi?id=9425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2020-36230 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36230
https://bugs.openldap.org/show_bug.cgi?id=9423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230
https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36230
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-2.4-2 | CVE-2021-27212 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u8 | Expand...
https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.debian.org/security/2021/dsa-4860
|
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
|
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.4-2 | CVE-2019-13057 | LOW | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u3 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9038
https://seclists.org/bugtraq/2019/Dec/23
https://security.netapp.com/advisory/ntap-20190822-0004/
https://support.apple.com/kb/HT210788
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/?findid=9038
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.4-2 | CVE-2019-13565 | LOW | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u3 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9052
https://seclists.org/bugtraq/2019/Dec/23
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/index.cgi/?findid=9052
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.4-2 | CVE-2022-29155 | UNKNOWN | 2.4.44+dfsg-5+deb9u1 | | Expand...
https://bugs.openldap.org/show_bug.cgi?id=9815
|
| libldap-common | CVE-2020-12243 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u4 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html
https://access.redhat.com/security/cve/CVE-2020-12243
https://bugs.openldap.org/show_bug.cgi?id=9202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243
https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES
https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440
https://linux.oracle.com/cve/CVE-2020-12243.html
https://linux.oracle.com/errata/ELSA-2020-4041.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html
https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/
https://security.netapp.com/advisory/ntap-20200511-0003/
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4352-1
https://ubuntu.com/security/notices/USN-4352-2
https://usn.ubuntu.com/4352-1/
https://usn.ubuntu.com/4352-2/
https://www.debian.org/security/2020/dsa-4666
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libldap-common | CVE-2020-25692 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u5 | Expand...
https://access.redhat.com/security/cve/CVE-2020-25692
https://bugzilla.redhat.com/show_bug.cgi?id=1894567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692
https://linux.oracle.com/cve/CVE-2020-25692.html
https://linux.oracle.com/errata/ELSA-2021-1389.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25692
https://security.netapp.com/advisory/ntap-20210108-0006/
https://ubuntu.com/security/notices/USN-4622-1
https://ubuntu.com/security/notices/USN-4622-2
|
| libldap-common | CVE-2020-25709 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u6 | Expand...
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2020-25709
https://bugzilla.redhat.com/show_bug.cgi?id=1899675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25709.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
|
| libldap-common | CVE-2020-25710 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u6 | Expand...
https://access.redhat.com/security/cve/CVE-2020-25710
https://bugzilla.redhat.com/show_bug.cgi?id=1899678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25710.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
|
| libldap-common | CVE-2020-36221 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36221
https://bugs.openldap.org/show_bug.cgi?id=9404
https://bugs.openldap.org/show_bug.cgi?id=9424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221
https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31
https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36221
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36222 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36222
https://bugs.openldap.org/show_bug.cgi?id=9406
https://bugs.openldap.org/show_bug.cgi?id=9407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36222
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36223 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36223
https://bugs.openldap.org/show_bug.cgi?id=9408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36224 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36224
https://bugs.openldap.org/show_bug.cgi?id=9409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36225 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36225
https://bugs.openldap.org/show_bug.cgi?id=9412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36225
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36226 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36226
https://bugs.openldap.org/show_bug.cgi?id=9413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36226
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36227 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36227
https://bugs.openldap.org/show_bug.cgi?id=9428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227
https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36227
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36228 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36228
https://bugs.openldap.org/show_bug.cgi?id=9427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228
https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36228
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36229 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36229
https://bugs.openldap.org/show_bug.cgi?id=9425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2020-36230 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u7 | Expand...
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36230
https://bugs.openldap.org/show_bug.cgi?id=9423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230
https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36230
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
|
| libldap-common | CVE-2021-27212 | HIGH | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u8 | Expand...
https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.debian.org/security/2021/dsa-4860
|
| libldap-common | CVE-2015-3276 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
|
| libldap-common | CVE-2017-14159 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-common | CVE-2017-17740 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-common | CVE-2019-13057 | LOW | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u3 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9038
https://seclists.org/bugtraq/2019/Dec/23
https://security.netapp.com/advisory/ntap-20190822-0004/
https://support.apple.com/kb/HT210788
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/?findid=9038
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-common | CVE-2019-13565 | LOW | 2.4.44+dfsg-5+deb9u1 | 2.4.44+dfsg-5+deb9u3 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9052
https://seclists.org/bugtraq/2019/Dec/23
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/index.cgi/?findid=9052
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-common | CVE-2020-15719 | LOW | 2.4.44+dfsg-5+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-common | CVE-2022-29155 | UNKNOWN | 2.4.44+dfsg-5+deb9u1 | | Expand...
https://bugs.openldap.org/show_bug.cgi?id=9815
|
| liblz4-1 | CVE-2021-3520 | CRITICAL | 0.0~r131-2 | 0.0~r131-2+deb9u1 | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json
https://access.redhat.com/security/cve/CVE-2021-3520
https://bugzilla.redhat.com/show_bug.cgi?id=1954559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
https://github.com/lz4/lz4/pull/972
https://linux.oracle.com/cve/CVE-2021-3520.html
https://linux.oracle.com/errata/ELSA-2021-2575.html
https://security.netapp.com/advisory/ntap-20211104-0005/
https://ubuntu.com/security/notices/USN-4968-1
https://ubuntu.com/security/notices/USN-4968-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| liblz4-1 | CVE-2019-17543 | LOW | 0.0~r131-2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| liblzma5 | CVE-2022-1271 | HIGH | 5.2.2-1.2 | 5.2.2-1.2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-1537.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
|
| libmount1 | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| libmount1 | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| libmount1 | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libmount1 | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libncursesw5 | CVE-2017-16879 | HIGH | 6.0+20161126-1+deb9u1 | 6.0+20161126-1+deb9u2 | Expand...
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
|
| libncursesw5 | CVE-2022-29458 | HIGH | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
|
| libncursesw5 | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
|
| libncursesw5 | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| libncursesw5 | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| libncursesw5 | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
|
| libnettle6 | CVE-2021-20305 | HIGH | 3.3-1 | 3.3-1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2021-20305
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
https://linux.oracle.com/cve/CVE-2021-20305.html
https://linux.oracle.com/errata/ELSA-2021-1206.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
https://security.gentoo.org/glsa/202105-31
https://security.netapp.com/advisory/ntap-20211022-0002/
https://ubuntu.com/security/notices/USN-4906-1
https://www.debian.org/security/2021/dsa-4933
|
| libnettle6 | CVE-2021-3580 | HIGH | 3.3-1 | 3.3-1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
|
| libnettle6 | CVE-2018-16869 | MEDIUM | 3.3-1 | | Expand...
http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://ubuntu.com/security/notices/USN-4990-1
|
| libp11-kit0 | CVE-2020-29361 | HIGH | 0.23.3-2 | 0.23.3-2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.debian.org/security/2021/dsa-4822
|
| libp11-kit0 | CVE-2020-29362 | MEDIUM | 0.23.3-2 | 0.23.3-2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.debian.org/security/2021/dsa-4822
|
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-3 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
|
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-3 | | Expand...
http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-3 | | Expand...
http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
|
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-3 | | Expand...
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
|
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-3 | | Expand...
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
|
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-3 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
|
| libsasl2-2 | CVE-2019-19906 | HIGH | 2.1.27~101-g0780600+dfsg-3 | 2.1.27~101-g0780600+dfsg-3+deb9u1 | Expand...
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2019-19906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906
https://github.com/cyrusimap/cyrus-sasl/issues/587
https://linux.oracle.com/cve/CVE-2019-19906.html
https://linux.oracle.com/errata/ELSA-2020-4497.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
https://nvd.nist.gov/vuln/detail/CVE-2019-19906
https://seclists.org/bugtraq/2019/Dec/42
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4256-1
https://usn.ubuntu.com/4256-1/
https://www.debian.org/security/2019/dsa-4591
https://www.openldap.org/its/index.cgi/Incoming?id=9123
|
| libsasl2-2 | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3 | 2.1.27~101-g0780600+dfsg-3+deb9u2 | Expand...
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
|
| libsasl2-modules-db | CVE-2019-19906 | HIGH | 2.1.27~101-g0780600+dfsg-3 | 2.1.27~101-g0780600+dfsg-3+deb9u1 | Expand...
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2019-19906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906
https://github.com/cyrusimap/cyrus-sasl/issues/587
https://linux.oracle.com/cve/CVE-2019-19906.html
https://linux.oracle.com/errata/ELSA-2020-4497.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
https://nvd.nist.gov/vuln/detail/CVE-2019-19906
https://seclists.org/bugtraq/2019/Dec/42
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4256-1
https://usn.ubuntu.com/4256-1/
https://www.debian.org/security/2019/dsa-4591
https://www.openldap.org/its/index.cgi/Incoming?id=9123
|
| libsasl2-modules-db | CVE-2022-24407 | HIGH | 2.1.27~101-g0780600+dfsg-3 | 2.1.27~101-g0780600+dfsg-3+deb9u2 | Expand...
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
|
| libsepol1 | CVE-2021-36084 | LOW | 2.6-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol1 | CVE-2021-36085 | LOW | 2.6-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol1 | CVE-2021-36086 | LOW | 2.6-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol1 | CVE-2021-36087 | LOW | 2.6-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
|
| libsmartcols1 | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| libsmartcols1 | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| libsmartcols1 | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libsmartcols1 | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libsqlite3-0 | CVE-2019-8457 | CRITICAL | 3.16.2-5+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
|
| libsqlite3-0 | CVE-2018-20346 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
http://www.securityfocus.com/bid/106323
https://access.redhat.com/articles/3758321
https://access.redhat.com/security/cve/CVE-2018-20346
https://blade.tencent.com/magellan/index_en.html
https://bugzilla.redhat.com/show_bug.cgi?id=1659379
https://bugzilla.redhat.com/show_bug.cgi?id=1659677
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e
https://crbug.com/900910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346
https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://news.ycombinator.com/item?id=18685296
https://security.gentoo.org/glsa/201904-21
https://sqlite.org/src/info/940f2adc8541a838
https://sqlite.org/src/info/d44318f59044162e
https://support.apple.com/HT209443
https://support.apple.com/HT209446
https://support.apple.com/HT209447
https://support.apple.com/HT209448
https://support.apple.com/HT209450
https://support.apple.com/HT209451
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://worthdoingbadly.com/sqlitebug/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/releaselog/3_25_3.html
https://www.synology.com/security/advisory/Synology_SA_18_61
|
| libsqlite3-0 | CVE-2018-20506 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
http://seclists.org/fulldisclosure/2019/Jan/62
http://seclists.org/fulldisclosure/2019/Jan/64
http://seclists.org/fulldisclosure/2019/Jan/66
http://seclists.org/fulldisclosure/2019/Jan/67
http://seclists.org/fulldisclosure/2019/Jan/68
http://seclists.org/fulldisclosure/2019/Jan/69
http://www.securityfocus.com/bid/106698
https://access.redhat.com/articles/3758321
https://access.redhat.com/security/cve/CVE-2018-20506
https://blade.tencent.com/magellan/index_en.html
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://seclists.org/bugtraq/2019/Jan/28
https://seclists.org/bugtraq/2019/Jan/29
https://seclists.org/bugtraq/2019/Jan/31
https://seclists.org/bugtraq/2019/Jan/32
https://seclists.org/bugtraq/2019/Jan/33
https://seclists.org/bugtraq/2019/Jan/39
https://security.netapp.com/advisory/ntap-20190502-0004/
https://sqlite.org/src/info/940f2adc8541a838
https://support.apple.com/kb/HT209443
https://support.apple.com/kb/HT209446
https://support.apple.com/kb/HT209447
https://support.apple.com/kb/HT209448
https://support.apple.com/kb/HT209450
https://support.apple.com/kb/HT209451
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| libsqlite3-0 | CVE-2018-8740 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://www.securityfocus.com/bid/103466
https://access.redhat.com/security/cve/CVE-2018-8740
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://ubuntu.com/security/notices/USN-4205-1
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4205-1/
https://usn.ubuntu.com/4394-1/
https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
|
| libsqlite3-0 | CVE-2019-20218 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u3 | Expand...
https://access.redhat.com/security/cve/CVE-2019-20218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218
https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387
https://linux.oracle.com/cve/CVE-2019-20218.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html
https://security.gentoo.org/glsa/202007-26
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| libsqlite3-0 | CVE-2019-5827 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
https://access.redhat.com/security/cve/CVE-2019-5827
https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html
https://crbug.com/952406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
https://linux.oracle.com/cve/CVE-2019-5827.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
https://seclists.org/bugtraq/2019/Aug/19
https://security.gentoo.org/glsa/202003-16
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.debian.org/security/2019/dsa-4500
|
| libsqlite3-0 | CVE-2019-9936 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html
http://www.securityfocus.com/bid/107562
https://access.redhat.com/security/cve/CVE-2019-9936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/
https://security.gentoo.org/glsa/201908-09
https://security.netapp.com/advisory/ntap-20190416-0005/
https://sqlite.org/src/info/b3fa58dd7403dbd4
https://ubuntu.com/security/notices/USN-4019-1
https://usn.ubuntu.com/4019-1/
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg114382.html
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg114394.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libsqlite3-0 | CVE-2019-9937 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html
http://www.securityfocus.com/bid/107562
https://access.redhat.com/security/cve/CVE-2019-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/
https://security.gentoo.org/glsa/201908-09
https://security.netapp.com/advisory/ntap-20190416-0005/
https://sqlite.org/src/info/45c73deb440496e8
https://ubuntu.com/security/notices/USN-4019-1
https://usn.ubuntu.com/4019-1/
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg114383.html
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg114393.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libsqlite3-0 | CVE-2020-11655 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
https://access.redhat.com/security/cve/CVE-2020-11655
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655
https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11
https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c
|
| libsqlite3-0 | CVE-2020-13630 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13630
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630
https://linux.oracle.com/cve/CVE-2020-13630.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/0d69f76f0865f962
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libsqlite3-0 | CVE-2020-13871 | HIGH | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
https://access.redhat.com/security/cve/CVE-2020-13871
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN32AGQPMHZRNM6P6L5GZPETOWTGXOKP/
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200619-0002/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.sqlite.org/src/info/79eff1d0383179c4
https://www.sqlite.org/src/info/c8d3b9f0a750a529
https://www.sqlite.org/src/info/cd708fa84d2aaaea
|
| libsqlite3-0 | CVE-2019-16168 | MEDIUM | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html
https://access.redhat.com/security/cve/CVE-2019-16168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-16168.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/
https://security.gentoo.org/glsa/202003-16
https://security.netapp.com/advisory/ntap-20190926-0003/
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg116312.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62
https://www.sqlite.org/src/timeline?c=98357d8c1263920b
https://www.tenable.com/security/tns-2021-08
https://www.tenable.com/security/tns-2021-11
https://www.tenable.com/security/tns-2021-14
|
| libsqlite3-0 | CVE-2020-13434 | MEDIUM | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434
https://linux.oracle.com/cve/CVE-2020-13434.html
https://linux.oracle.com/errata/ELSA-2021-1581.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200528-0004/
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.sqlite.org/src/info/23439ea582241138
https://www.sqlite.org/src/info/d08d3405878d394e
|
| libsqlite3-0 | CVE-2020-13632 | MEDIUM | 3.16.2-5+deb9u1 | 3.16.2-5+deb9u2 | Expand...
https://access.redhat.com/security/cve/CVE-2020-13632
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632
https://linux.oracle.com/cve/CVE-2020-13632.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/a4dd148928ea65bd
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.16.2-5+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
|
| libsqlite3-0 | CVE-2017-13685 | LOW | 3.16.2-5+deb9u1 | | Expand...
http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
http://www.securityfocus.com/bid/100521
https://access.redhat.com/security/cve/CVE-2017-13685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
|
| libsqlite3-0 | CVE-2020-11656 | LOW | 3.16.2-5+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
|
| libss2 | CVE-2022-1304 | HIGH | 1.43.4-2 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
|
| libss2 | CVE-2019-5094 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
|
| libss2 | CVE-2019-5188 | MEDIUM | 1.43.4-2 | 1.43.4-2+deb9u2 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
|
| libssl1.1 | CVE-2018-0732 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104442
http://www.securitytracker.com/id/1041090
https://access.redhat.com/errata/RHSA-2018:2552
https://access.redhat.com/errata/RHSA-2018:2553
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-0732
https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
https://linux.oracle.com/cve/CVE-2018-0732.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-03
https://security.netapp.com/advisory/ntap-20181105-0001/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180612.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
|
| libssl1.1 | CVE-2019-1543 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0k-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/security/cve/CVE-2019-1543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ee22257b1418438ebaf54df98af4e24f494d1809
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f426625b6ae9a7831010750490a5f0ad689c5ba3
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1543.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://seclists.org/bugtraq/2019/Jul/3
https://www.debian.org/security/2019/dsa-4475
https://www.openssl.org/news/secadv/20190306.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libssl1.1 | CVE-2021-23840 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u3 | Expand...
https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
|
| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u4 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
|
| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u5 | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
|
| libssl1.1 | CVE-2018-0734 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://www.securityfocus.com/bid/105758
https://access.redhat.com/errata/RHSA-2019:2304
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7
https://linux.oracle.com/cve/CVE-2018-0734.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2018-0734
https://security.netapp.com/advisory/ntap-20181105-0002/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://security.netapp.com/advisory/ntap-20190423-0002/
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20181030.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
|
| libssl1.1 | CVE-2018-0735 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.securityfocus.com/bid/105750
http://www.securitytracker.com/id/1041986
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/security/cve/CVE-2018-0735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4
https://linux.oracle.com/cve/CVE-2018-0735.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://security.netapp.com/advisory/ntap-20181105-0002/
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.openssl.org/news/secadv/20181029.txt
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| libssl1.1 | CVE-2018-0737 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.openwall.com/lists/oss-security/2018/04/16/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103766
http://www.securitytracker.com/id/1040685
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
https://linux.oracle.com/cve/CVE-2018-0737.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.netapp.com/advisory/ntap-20180726-0003/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3628-1
https://ubuntu.com/security/notices/USN-3628-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3628-1/
https://usn.ubuntu.com/3628-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180416.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
|
| libssl1.1 | CVE-2018-0739 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0f-3+deb9u2 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103518
http://www.securityfocus.com/bid/105609
http://www.securitytracker.com/id/1040576
https://access.redhat.com/errata/RHSA-2018:3090
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1711
https://access.redhat.com/errata/RHSA-2019:1712
https://access.redhat.com/security/cve/CVE-2018-0739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d
https://linux.oracle.com/cve/CVE-2018-0739.html
https://linux.oracle.com/errata/ELSA-2018-4228.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html
https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20180330-0002/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3611-1
https://ubuntu.com/security/notices/USN-3611-2
https://usn.ubuntu.com/3611-1/
https://usn.ubuntu.com/3611-2/
https://www.debian.org/security/2018/dsa-4157
https://www.debian.org/security/2018/dsa-4158
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
|
| libssl1.1 | CVE-2018-5407 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.securityfocus.com/bid/105897
https://access.redhat.com/errata/RHSA-2019:0483
https://access.redhat.com/errata/RHSA-2019:0651
https://access.redhat.com/errata/RHSA-2019:0652
https://access.redhat.com/errata/RHSA-2019:2125
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-5407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
https://eprint.iacr.org/2018/1060.pdf
https://github.com/bbbrumley/portsmash
https://linux.oracle.com/cve/CVE-2018-5407.html
https://linux.oracle.com/errata/ELSA-2019-2125.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://security.gentoo.org/glsa/201903-10
https://security.netapp.com/advisory/ntap-20181126-0001/
https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.exploit-db.com/exploits/45785/
https://www.openssl.org/news/secadv/20181112.txt
https://www.openwall.com/lists/oss-security/2018/11/01/4
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
|
| libssl1.1 | CVE-2019-1547 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
|
| libssl1.1 | CVE-2019-1551 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u5 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
|
| libssl1.1 | CVE-2020-1971 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u2 | Expand...
http://www.openwall.com/lists/oss-security/2021/09/14/2
https://access.redhat.com/security/cve/CVE-2020-1971
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
https://linux.oracle.com/cve/CVE-2020-1971.html
https://linux.oracle.com/errata/ELSA-2021-9150.html
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://nvd.nist.gov/vuln/detail/CVE-2020-1971
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
https://security.gentoo.org/glsa/202012-13
https://security.netapp.com/advisory/ntap-20201218-0005/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4662-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2020/dsa-4807
https://www.openssl.org/news/secadv/20201208.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
|
| libssl1.1 | CVE-2021-23841 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u3 | Expand...
http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
|
| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.0f-3+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libssl1.1 | CVE-2022-1292 | MEDIUM | 1.1.0f-3+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://ubuntu.com/security/notices/USN-5402-1
https://www.openssl.org/news/secadv/20220503.txt
|
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.0f-3+deb9u1 | | Expand...
http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
|
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.0f-3+deb9u1 | | Expand...
http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
|
| libssl1.1 | CVE-2017-3738 | LOW | 1.1.0f-3+deb9u1 | 1.1.0f-3+deb9u2 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/102118
http://www.securitytracker.com/id/1039978
https://access.redhat.com/errata/RHSA-2018:0998
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2017-3738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738
https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a
https://linux.oracle.com/cve/CVE-2017-3738.html
https://linux.oracle.com/errata/ELSA-2018-0998.html
https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20171208-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us
https://ubuntu.com/security/notices/USN-3512-1
https://www.debian.org/security/2017/dsa-4065
https://www.debian.org/security/2018/dsa-4157
https://www.openssl.org/news/secadv/20171207.txt
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-16
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
|
| libssl1.1 | CVE-2018-0733 | LOW | 1.1.0f-3+deb9u1 | 1.1.0f-3+deb9u2 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103517
http://www.securitytracker.com/id/1040576
https://access.redhat.com/security/cve/CVE-2018-0733
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f
https://security.gentoo.org/glsa/201811-21
https://security.netapp.com/advisory/ntap-20180330-0002/
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
|
| libssl1.1 | CVE-2019-1563 | LOW | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
|
| libstdc++6 | CVE-2018-12886 | HIGH | 6.3.0-18 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
|
| libstdc++6 | DSA-4121-1 | UNKNOWN | 6.3.0-18 | 6.3.0-18+deb9u1 | Expand...
|
| libsystemd0 | CVE-2017-15908 | HIGH | 232-25+deb9u1 | 232-25+deb9u2 | Expand...
http://www.securityfocus.com/bid/101600
http://www.securitytracker.com/id/1039662
https://access.redhat.com/security/cve/CVE-2017-15908
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908
https://github.com/systemd/systemd/pull/7184
https://ubuntu.com/security/notices/USN-3466-1
https://ubuntu.com/security/notices/USN-3558-1
https://usn.ubuntu.com/3558-1/
|
| libsystemd0 | CVE-2018-15686 | HIGH | 232-25+deb9u1 | 232-25+deb9u10 | Expand...
http://www.securityfocus.com/bid/105747
https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/errata/RHSA-2019:3222
https://access.redhat.com/errata/RHSA-2020:0593
https://access.redhat.com/security/cve/CVE-2018-15686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686
https://github.com/systemd/systemd/pull/10519
https://linux.oracle.com/cve/CVE-2018-15686.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2018-15686
https://security.gentoo.org/glsa/201810-10
https://ubuntu.com/security/notices/USN-3816-1
https://usn.ubuntu.com/3816-1/
https://www.exploit-db.com/exploits/45714/
https://www.oracle.com//security-alerts/cpujul2021.html
|
| libsystemd0 | CVE-2018-15688 | HIGH | 232-25+deb9u1 | 232-25+deb9u6 | Expand...
http://www.securityfocus.com/bid/105745
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3665
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/security/cve/CVE-2018-15688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688
https://github.com/systemd/systemd/pull/10518
https://linux.oracle.com/cve/CVE-2018-15688.html
https://linux.oracle.com/errata/ELSA-2019-0049.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2018-15688
https://security.gentoo.org/glsa/201810-10
https://ubuntu.com/security/notices/USN-3806-1
https://ubuntu.com/security/notices/USN-3807-1
https://usn.ubuntu.com/3806-1/
https://usn.ubuntu.com/3807-1/
|
| libsystemd0 | CVE-2018-16864 | HIGH | 232-25+deb9u1 | 232-25+deb9u7 | Expand...
http://www.openwall.com/lists/oss-security/2021/07/20/2
http://www.securityfocus.com/bid/106523
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/errata/RHSA-2019:0204
https://access.redhat.com/errata/RHSA-2019:0271
https://access.redhat.com/errata/RHSA-2019:0342
https://access.redhat.com/errata/RHSA-2019:0361
https://access.redhat.com/errata/RHSA-2019:2402
https://access.redhat.com/security/cve/CVE-2018-16864
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864
https://linux.oracle.com/cve/CVE-2018-16864.html
https://linux.oracle.com/errata/ELSA-2019-0049.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16864
https://security.gentoo.org/glsa/201903-07
https://security.netapp.com/advisory/ntap-20190117-0001/
https://ubuntu.com/security/notices/USN-3855-1
https://usn.ubuntu.com/3855-1/
https://www.debian.org/security/2019/dsa-4367
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.qualys.com/2019/01/09/system-down/system-down.txt
|
| libsystemd0 | CVE-2018-16865 | HIGH | 232-25+deb9u1 | 232-25+deb9u7 | Expand...
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
http://seclists.org/fulldisclosure/2019/May/21
http://www.openwall.com/lists/oss-security/2019/05/10/4
http://www.openwall.com/lists/oss-security/2021/07/20/2
http://www.securityfocus.com/bid/106525
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/errata/RHSA-2019:0204
https://access.redhat.com/errata/RHSA-2019:0271
https://access.redhat.com/errata/RHSA-2019:0342
https://access.redhat.com/errata/RHSA-2019:0361
https://access.redhat.com/errata/RHSA-2019:2402
https://access.redhat.com/security/cve/CVE-2018-16865
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865
https://linux.oracle.com/cve/CVE-2018-16865.html
https://linux.oracle.com/errata/ELSA-2019-0049.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16865
https://seclists.org/bugtraq/2019/May/25
https://security.gentoo.org/glsa/201903-07
https://security.netapp.com/advisory/ntap-20190117-0001/
https://ubuntu.com/security/notices/USN-3855-1
https://usn.ubuntu.com/3855-1/
https://www.debian.org/security/2019/dsa-4367
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.qualys.com/2019/01/09/system-down/system-down.txt
|
| libsystemd0 | CVE-2019-3842 | HIGH | 232-25+deb9u1 | 232-25+deb9u11 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
|
| libsystemd0 | CVE-2019-3843 | HIGH | 232-25+deb9u1 | | Expand...
http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libsystemd0 | CVE-2019-3844 | HIGH | 232-25+deb9u1 | | Expand...
http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libsystemd0 | CVE-2020-1712 | HIGH | 232-25+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1712
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712
https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
https://linux.oracle.com/cve/CVE-2020-1712.html
https://linux.oracle.com/errata/ELSA-2020-0575.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1712
https://ubuntu.com/security/notices/USN-4269-1
https://www.openwall.com/lists/oss-security/2020/02/05/1
|
| libsystemd0 | CVE-2018-1049 | MEDIUM | 232-25+deb9u1 | 232-25+deb9u10 | Expand...
http://www.securitytracker.com/id/1041520
https://access.redhat.com/errata/RHSA-2018:0260
https://access.redhat.com/security/cve/CVE-2018-1049
https://bugzilla.redhat.com/show_bug.cgi?id=1534701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049
https://github.com/systemd/systemd/pull/5916
https://linux.oracle.com/cve/CVE-2018-1049.html
https://linux.oracle.com/errata/ELSA-2018-0260.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://ubuntu.com/security/notices/USN-3558-1
https://usn.ubuntu.com/3558-1/
|
| libsystemd0 | CVE-2019-6454 | MEDIUM | 232-25+deb9u1 | 232-25+deb9u9 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://www.openwall.com/lists/oss-security/2019/02/18/3
http://www.openwall.com/lists/oss-security/2019/02/19/1
http://www.openwall.com/lists/oss-security/2021/07/20/2
http://www.securityfocus.com/bid/107081
https://access.redhat.com/errata/RHSA-2019:0368
https://access.redhat.com/errata/RHSA-2019:0990
https://access.redhat.com/errata/RHSA-2019:1322
https://access.redhat.com/errata/RHSA-2019:1502
https://access.redhat.com/errata/RHSA-2019:2805
https://access.redhat.com/security/cve/CVE-2019-6454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454
https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-6454.html
https://linux.oracle.com/errata/ELSA-2019-0990.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/
https://nvd.nist.gov/vuln/detail/CVE-2019-6454
https://security.netapp.com/advisory/ntap-20190327-0004/
https://ubuntu.com/security/notices/USN-3891-1
https://usn.ubuntu.com/3891-1/
https://www.debian.org/security/2019/dsa-4393
|
| libsystemd0 | CVE-2021-33910 | MEDIUM | 232-25+deb9u1 | 232-25+deb9u13 | Expand...
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
| libsystemd0 | CVE-2021-3997 | MEDIUM | 232-25+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| libsystemd0 | CVE-2013-4392 | LOW | 232-25+deb9u1 | | Expand...
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
| libsystemd0 | CVE-2017-1000082 | LOW | 232-25+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2017/07/02/1
http://www.securityfocus.com/bid/99507
http://www.securitytracker.com/id/1038839
https://access.redhat.com/security/cve/CVE-2017-1000082
https://github.com/systemd/systemd/issues/6237
|
| libsystemd0 | CVE-2017-18078 | LOW | 232-25+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
|
| libsystemd0 | CVE-2018-16866 | LOW | 232-25+deb9u1 | 232-25+deb9u7 | Expand...
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
http://seclists.org/fulldisclosure/2019/May/21
http://www.openwall.com/lists/oss-security/2019/05/10/4
http://www.securityfocus.com/bid/106527
https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/errata/RHSA-2019:3222
https://access.redhat.com/errata/RHSA-2020:0593
https://access.redhat.com/security/cve/CVE-2018-16866
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866
https://linux.oracle.com/cve/CVE-2018-16866.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16866
https://seclists.org/bugtraq/2019/May/25
https://security.gentoo.org/glsa/201903-07
https://security.netapp.com/advisory/ntap-20190117-0001/
https://ubuntu.com/security/notices/USN-3855-1
https://usn.ubuntu.com/3855-1/
https://www.debian.org/security/2019/dsa-4367
https://www.qualys.com/2019/01/09/system-down/system-down.txt
|
| libsystemd0 | CVE-2018-16888 | LOW | 232-25+deb9u1 | | Expand...
https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/security/cve/CVE-2018-16888
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888
https://linux.oracle.com/cve/CVE-2018-16888.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E
https://security.netapp.com/advisory/ntap-20190307-0007/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libsystemd0 | CVE-2018-6954 | LOW | 232-25+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
|
| libsystemd0 | CVE-2019-20386 | LOW | 232-25+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libsystemd0 | CVE-2019-3815 | LOW | 232-25+deb9u1 | 232-25+deb9u8 | Expand...
http://www.securityfocus.com/bid/106632
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0201
https://access.redhat.com/security/cve/CVE-2019-3815
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3815
https://linux.oracle.com/cve/CVE-2019-3815.html
https://linux.oracle.com/errata/ELSA-2019-0201.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00013.html
|
| libsystemd0 | CVE-2020-13529 | LOW | 232-25+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
|
| libsystemd0 | CVE-2020-13776 | LOW | 232-25+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
|
| libsystemd0 | DSA-4367-2 | UNKNOWN | 232-25+deb9u1 | 232-25+deb9u8 | Expand...
|
| libtasn1-6 | CVE-2017-10790 | HIGH | 4.10-1.1 | 4.10-1.1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2017-10790
https://bugzilla.redhat.com/show_bug.cgi?id=1464141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3547-1
https://usn.ubuntu.com/3547-1/
https://www.debian.org/security/2018/dsa-4106
|
| libtasn1-6 | CVE-2018-6003 | HIGH | 4.10-1.1 | 4.10-1.1+deb9u1 | Expand...
http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
https://access.redhat.com/security/cve/CVE-2018-6003
https://bugzilla.redhat.com/show_bug.cgi?id=1535926
https://bugzilla.suse.com/show_bug.cgi?id=1076832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003
https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3547-1
https://www.debian.org/security/2018/dsa-4106
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.10-1.1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
|
| libtinfo5 | CVE-2017-16879 | HIGH | 6.0+20161126-1+deb9u1 | 6.0+20161126-1+deb9u2 | Expand...
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
|
| libtinfo5 | CVE-2022-29458 | HIGH | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
|
| libtinfo5 | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
|
| libtinfo5 | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| libtinfo5 | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| libtinfo5 | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
|
| libudev1 | CVE-2017-15908 | HIGH | 232-25+deb9u1 | 232-25+deb9u2 | Expand...
http://www.securityfocus.com/bid/101600
http://www.securitytracker.com/id/1039662
https://access.redhat.com/security/cve/CVE-2017-15908
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908
https://github.com/systemd/systemd/pull/7184
https://ubuntu.com/security/notices/USN-3466-1
https://ubuntu.com/security/notices/USN-3558-1
https://usn.ubuntu.com/3558-1/
|
| libudev1 | CVE-2018-15686 | HIGH | 232-25+deb9u1 | 232-25+deb9u10 | Expand...
http://www.securityfocus.com/bid/105747
https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/errata/RHSA-2019:3222
https://access.redhat.com/errata/RHSA-2020:0593
https://access.redhat.com/security/cve/CVE-2018-15686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686
https://github.com/systemd/systemd/pull/10519
https://linux.oracle.com/cve/CVE-2018-15686.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2018-15686
https://security.gentoo.org/glsa/201810-10
https://ubuntu.com/security/notices/USN-3816-1
https://usn.ubuntu.com/3816-1/
https://www.exploit-db.com/exploits/45714/
https://www.oracle.com//security-alerts/cpujul2021.html
|
| libudev1 | CVE-2018-15688 | HIGH | 232-25+deb9u1 | 232-25+deb9u6 | Expand...
http://www.securityfocus.com/bid/105745
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3665
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/security/cve/CVE-2018-15688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688
https://github.com/systemd/systemd/pull/10518
https://linux.oracle.com/cve/CVE-2018-15688.html
https://linux.oracle.com/errata/ELSA-2019-0049.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2018-15688
https://security.gentoo.org/glsa/201810-10
https://ubuntu.com/security/notices/USN-3806-1
https://ubuntu.com/security/notices/USN-3807-1
https://usn.ubuntu.com/3806-1/
https://usn.ubuntu.com/3807-1/
|
| libudev1 | CVE-2018-16864 | HIGH | 232-25+deb9u1 | 232-25+deb9u7 | Expand...
http://www.openwall.com/lists/oss-security/2021/07/20/2
http://www.securityfocus.com/bid/106523
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/errata/RHSA-2019:0204
https://access.redhat.com/errata/RHSA-2019:0271
https://access.redhat.com/errata/RHSA-2019:0342
https://access.redhat.com/errata/RHSA-2019:0361
https://access.redhat.com/errata/RHSA-2019:2402
https://access.redhat.com/security/cve/CVE-2018-16864
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864
https://linux.oracle.com/cve/CVE-2018-16864.html
https://linux.oracle.com/errata/ELSA-2019-0049.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16864
https://security.gentoo.org/glsa/201903-07
https://security.netapp.com/advisory/ntap-20190117-0001/
https://ubuntu.com/security/notices/USN-3855-1
https://usn.ubuntu.com/3855-1/
https://www.debian.org/security/2019/dsa-4367
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.qualys.com/2019/01/09/system-down/system-down.txt
|
| libudev1 | CVE-2018-16865 | HIGH | 232-25+deb9u1 | 232-25+deb9u7 | Expand...
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
http://seclists.org/fulldisclosure/2019/May/21
http://www.openwall.com/lists/oss-security/2019/05/10/4
http://www.openwall.com/lists/oss-security/2021/07/20/2
http://www.securityfocus.com/bid/106525
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/errata/RHSA-2019:0204
https://access.redhat.com/errata/RHSA-2019:0271
https://access.redhat.com/errata/RHSA-2019:0342
https://access.redhat.com/errata/RHSA-2019:0361
https://access.redhat.com/errata/RHSA-2019:2402
https://access.redhat.com/security/cve/CVE-2018-16865
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865
https://linux.oracle.com/cve/CVE-2018-16865.html
https://linux.oracle.com/errata/ELSA-2019-0049.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16865
https://seclists.org/bugtraq/2019/May/25
https://security.gentoo.org/glsa/201903-07
https://security.netapp.com/advisory/ntap-20190117-0001/
https://ubuntu.com/security/notices/USN-3855-1
https://usn.ubuntu.com/3855-1/
https://www.debian.org/security/2019/dsa-4367
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.qualys.com/2019/01/09/system-down/system-down.txt
|
| libudev1 | CVE-2019-3842 | HIGH | 232-25+deb9u1 | 232-25+deb9u11 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
|
| libudev1 | CVE-2019-3843 | HIGH | 232-25+deb9u1 | | Expand...
http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libudev1 | CVE-2019-3844 | HIGH | 232-25+deb9u1 | | Expand...
http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libudev1 | CVE-2020-1712 | HIGH | 232-25+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1712
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712
https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
https://linux.oracle.com/cve/CVE-2020-1712.html
https://linux.oracle.com/errata/ELSA-2020-0575.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1712
https://ubuntu.com/security/notices/USN-4269-1
https://www.openwall.com/lists/oss-security/2020/02/05/1
|
| libudev1 | CVE-2018-1049 | MEDIUM | 232-25+deb9u1 | 232-25+deb9u10 | Expand...
http://www.securitytracker.com/id/1041520
https://access.redhat.com/errata/RHSA-2018:0260
https://access.redhat.com/security/cve/CVE-2018-1049
https://bugzilla.redhat.com/show_bug.cgi?id=1534701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049
https://github.com/systemd/systemd/pull/5916
https://linux.oracle.com/cve/CVE-2018-1049.html
https://linux.oracle.com/errata/ELSA-2018-0260.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://ubuntu.com/security/notices/USN-3558-1
https://usn.ubuntu.com/3558-1/
|
| libudev1 | CVE-2019-6454 | MEDIUM | 232-25+deb9u1 | 232-25+deb9u9 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://www.openwall.com/lists/oss-security/2019/02/18/3
http://www.openwall.com/lists/oss-security/2019/02/19/1
http://www.openwall.com/lists/oss-security/2021/07/20/2
http://www.securityfocus.com/bid/107081
https://access.redhat.com/errata/RHSA-2019:0368
https://access.redhat.com/errata/RHSA-2019:0990
https://access.redhat.com/errata/RHSA-2019:1322
https://access.redhat.com/errata/RHSA-2019:1502
https://access.redhat.com/errata/RHSA-2019:2805
https://access.redhat.com/security/cve/CVE-2019-6454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454
https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-6454.html
https://linux.oracle.com/errata/ELSA-2019-0990.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/
https://nvd.nist.gov/vuln/detail/CVE-2019-6454
https://security.netapp.com/advisory/ntap-20190327-0004/
https://ubuntu.com/security/notices/USN-3891-1
https://usn.ubuntu.com/3891-1/
https://www.debian.org/security/2019/dsa-4393
|
| libudev1 | CVE-2021-33910 | MEDIUM | 232-25+deb9u1 | 232-25+deb9u13 | Expand...
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
| libudev1 | CVE-2021-3997 | MEDIUM | 232-25+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| libudev1 | CVE-2013-4392 | LOW | 232-25+deb9u1 | | Expand...
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
| libudev1 | CVE-2017-1000082 | LOW | 232-25+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2017/07/02/1
http://www.securityfocus.com/bid/99507
http://www.securitytracker.com/id/1038839
https://access.redhat.com/security/cve/CVE-2017-1000082
https://github.com/systemd/systemd/issues/6237
|
| libudev1 | CVE-2017-18078 | LOW | 232-25+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
|
| libudev1 | CVE-2018-16866 | LOW | 232-25+deb9u1 | 232-25+deb9u7 | Expand...
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
http://seclists.org/fulldisclosure/2019/May/21
http://www.openwall.com/lists/oss-security/2019/05/10/4
http://www.securityfocus.com/bid/106527
https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/errata/RHSA-2019:3222
https://access.redhat.com/errata/RHSA-2020:0593
https://access.redhat.com/security/cve/CVE-2018-16866
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866
https://linux.oracle.com/cve/CVE-2018-16866.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16866
https://seclists.org/bugtraq/2019/May/25
https://security.gentoo.org/glsa/201903-07
https://security.netapp.com/advisory/ntap-20190117-0001/
https://ubuntu.com/security/notices/USN-3855-1
https://usn.ubuntu.com/3855-1/
https://www.debian.org/security/2019/dsa-4367
https://www.qualys.com/2019/01/09/system-down/system-down.txt
|
| libudev1 | CVE-2018-16888 | LOW | 232-25+deb9u1 | | Expand...
https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/security/cve/CVE-2018-16888
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888
https://linux.oracle.com/cve/CVE-2018-16888.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E
https://security.netapp.com/advisory/ntap-20190307-0007/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libudev1 | CVE-2018-6954 | LOW | 232-25+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
|
| libudev1 | CVE-2019-20386 | LOW | 232-25+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libudev1 | CVE-2019-3815 | LOW | 232-25+deb9u1 | 232-25+deb9u8 | Expand...
http://www.securityfocus.com/bid/106632
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0201
https://access.redhat.com/security/cve/CVE-2019-3815
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3815
https://linux.oracle.com/cve/CVE-2019-3815.html
https://linux.oracle.com/errata/ELSA-2019-0201.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00013.html
|
| libudev1 | CVE-2020-13529 | LOW | 232-25+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
|
| libudev1 | CVE-2020-13776 | LOW | 232-25+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
|
| libudev1 | DSA-4367-2 | UNKNOWN | 232-25+deb9u1 | 232-25+deb9u8 | Expand...
|
| libuuid1 | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| libuuid1 | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| libuuid1 | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libuuid1 | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| login | CVE-2017-12424 | CRITICAL | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2017-12424
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424
https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
https://security.gentoo.org/glsa/201710-16
https://ubuntu.com/security/notices/USN-5254-1
|
| login | CVE-2017-20002 | HIGH | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | Expand...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
|
| login | CVE-2007-5686 | LOW | 1:4.4-4.1 | | Expand...
http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
|
| login | CVE-2013-4235 | LOW | 1:4.4-4.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
|
| login | CVE-2018-7169 | LOW | 1:4.4-4.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
|
| login | CVE-2019-19882 | LOW | 1:4.4-4.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
|
| mount | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| mount | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| mount | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| mount | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| multiarch-support | CVE-2017-18269 | CRITICAL | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
https://access.redhat.com/security/cve/CVE-2017-18269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269
https://github.com/fingolfin/memmove-bug
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=22644
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| multiarch-support | CVE-2018-6485 | CRITICAL | 2.24-11+deb9u1 | | Expand...
http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| multiarch-support | CVE-2018-6551 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
|
| multiarch-support | CVE-2019-9169 | CRITICAL | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| multiarch-support | CVE-2021-33574 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| multiarch-support | CVE-2021-35942 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
|
| multiarch-support | CVE-2022-23218 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
|
| multiarch-support | CVE-2022-23219 | CRITICAL | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
|
| multiarch-support | CVE-2009-5155 | HIGH | 2.24-11+deb9u1 | | Expand...
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
|
| multiarch-support | CVE-2017-1000408 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
https://access.redhat.com/security/cve/CVE-2017-1000408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
|
| multiarch-support | CVE-2017-1000409 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
https://access.redhat.com/security/cve/CVE-2017-1000409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
|
| multiarch-support | CVE-2017-16997 | HIGH | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/102228
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2017-16997
https://bugs.debian.org/884615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
https://linux.oracle.com/cve/CVE-2017-16997.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22625
https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
https://ubuntu.com/security/notices/USN-3534-1
|
| multiarch-support | CVE-2018-1000001 | HIGH | 2.24-11+deb9u1 | | Expand...
http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
|
| multiarch-support | CVE-2020-1751 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| multiarch-support | CVE-2020-1752 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| multiarch-support | CVE-2021-3326 | HIGH | 2.24-11+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| multiarch-support | CVE-2021-3999 | HIGH | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| multiarch-support | CVE-2016-10739 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
|
| multiarch-support | CVE-2017-12132 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
|
| multiarch-support | CVE-2017-12133 | MEDIUM | 2.24-11+deb9u1 | 2.24-11+deb9u2 | Expand...
https://access.redhat.com/security/cve/CVE-2017-12133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/
https://sourceware.org/bugzilla/show_bug.cgi?id=21115
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.securityfocus.com/bid/100679
|
| multiarch-support | CVE-2019-25013 | MEDIUM | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| multiarch-support | CVE-2020-10029 | MEDIUM | 2.24-11+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| multiarch-support | CVE-2020-27618 | MEDIUM | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| multiarch-support | CVE-2010-4756 | LOW | 2.24-11+deb9u1 | | Expand...
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
|
| multiarch-support | CVE-2015-8985 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
|
| multiarch-support | CVE-2016-10228 | LOW | 2.24-11+deb9u1 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| multiarch-support | CVE-2017-15670 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101521
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
https://linux.oracle.com/cve/CVE-2017-15670.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22320
https://ubuntu.com/security/notices/USN-3534-1
|
| multiarch-support | CVE-2017-15671 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| multiarch-support | CVE-2017-15804 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/101535
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
https://linux.oracle.com/cve/CVE-2017-15804.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
https://ubuntu.com/security/notices/USN-3534-1
|
| multiarch-support | CVE-2018-11236 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/104255
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-11236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236
https://linux.oracle.com/cve/CVE-2018-11236.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=22786
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| multiarch-support | CVE-2018-11237 | LOW | 2.24-11+deb9u1 | 2.24-11+deb9u4 | Expand...
http://www.securityfocus.com/bid/104256
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-11237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237
https://linux.oracle.com/cve/CVE-2018-11237.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190329-0001/
https://security.netapp.com/advisory/ntap-20190401-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23196
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.exploit-db.com/exploits/44750/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| multiarch-support | CVE-2018-20796 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
| multiarch-support | CVE-2019-1010022 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
|
| multiarch-support | CVE-2019-1010023 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
|
| multiarch-support | CVE-2019-1010024 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
|
| multiarch-support | CVE-2019-1010025 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
|
| multiarch-support | CVE-2019-19126 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
|
| multiarch-support | CVE-2019-6488 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
|
| multiarch-support | CVE-2019-7309 | LOW | 2.24-11+deb9u1 | | Expand...
http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
|
| multiarch-support | CVE-2019-9192 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
|
| multiarch-support | CVE-2020-6096 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
| multiarch-support | CVE-2021-27645 | LOW | 2.24-11+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
|
| ncurses-base | CVE-2017-16879 | HIGH | 6.0+20161126-1+deb9u1 | 6.0+20161126-1+deb9u2 | Expand...
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
|
| ncurses-base | CVE-2022-29458 | HIGH | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
|
| ncurses-base | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
|
| ncurses-base | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| ncurses-base | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| ncurses-base | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
|
| ncurses-bin | CVE-2017-16879 | HIGH | 6.0+20161126-1+deb9u1 | 6.0+20161126-1+deb9u2 | Expand...
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
|
| ncurses-bin | CVE-2022-29458 | HIGH | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
|
| ncurses-bin | CVE-2018-19211 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
|
| ncurses-bin | CVE-2019-17594 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| ncurses-bin | CVE-2019-17595 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| ncurses-bin | CVE-2021-39537 | LOW | 6.0+20161126-1+deb9u1 | | Expand...
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
|
| openssl | CVE-2018-0732 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104442
http://www.securitytracker.com/id/1041090
https://access.redhat.com/errata/RHSA-2018:2552
https://access.redhat.com/errata/RHSA-2018:2553
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-0732
https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
https://linux.oracle.com/cve/CVE-2018-0732.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-03
https://security.netapp.com/advisory/ntap-20181105-0001/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180612.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
|
| openssl | CVE-2019-1543 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0k-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/security/cve/CVE-2019-1543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ee22257b1418438ebaf54df98af4e24f494d1809
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f426625b6ae9a7831010750490a5f0ad689c5ba3
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1543.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://seclists.org/bugtraq/2019/Jul/3
https://www.debian.org/security/2019/dsa-4475
https://www.openssl.org/news/secadv/20190306.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssl | CVE-2021-23840 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u3 | Expand...
https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
|
| openssl | CVE-2021-3712 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u4 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
|
| openssl | CVE-2022-0778 | HIGH | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u5 | Expand...
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
|
| openssl | CVE-2018-0734 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://www.securityfocus.com/bid/105758
https://access.redhat.com/errata/RHSA-2019:2304
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7
https://linux.oracle.com/cve/CVE-2018-0734.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2018-0734
https://security.netapp.com/advisory/ntap-20181105-0002/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://security.netapp.com/advisory/ntap-20190423-0002/
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20181030.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
|
| openssl | CVE-2018-0735 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.securityfocus.com/bid/105750
http://www.securitytracker.com/id/1041986
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/security/cve/CVE-2018-0735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4
https://linux.oracle.com/cve/CVE-2018-0735.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://security.netapp.com/advisory/ntap-20181105-0002/
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.openssl.org/news/secadv/20181029.txt
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| openssl | CVE-2018-0737 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.openwall.com/lists/oss-security/2018/04/16/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103766
http://www.securitytracker.com/id/1040685
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
https://linux.oracle.com/cve/CVE-2018-0737.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.netapp.com/advisory/ntap-20180726-0003/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3628-1
https://ubuntu.com/security/notices/USN-3628-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3628-1/
https://usn.ubuntu.com/3628-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180416.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
|
| openssl | CVE-2018-0739 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0f-3+deb9u2 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103518
http://www.securityfocus.com/bid/105609
http://www.securitytracker.com/id/1040576
https://access.redhat.com/errata/RHSA-2018:3090
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1711
https://access.redhat.com/errata/RHSA-2019:1712
https://access.redhat.com/security/cve/CVE-2018-0739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d
https://linux.oracle.com/cve/CVE-2018-0739.html
https://linux.oracle.com/errata/ELSA-2018-4228.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html
https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20180330-0002/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3611-1
https://ubuntu.com/security/notices/USN-3611-2
https://usn.ubuntu.com/3611-1/
https://usn.ubuntu.com/3611-2/
https://www.debian.org/security/2018/dsa-4157
https://www.debian.org/security/2018/dsa-4158
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
|
| openssl | CVE-2018-5407 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0j-1~deb9u1 | Expand...
http://www.securityfocus.com/bid/105897
https://access.redhat.com/errata/RHSA-2019:0483
https://access.redhat.com/errata/RHSA-2019:0651
https://access.redhat.com/errata/RHSA-2019:0652
https://access.redhat.com/errata/RHSA-2019:2125
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-5407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
https://eprint.iacr.org/2018/1060.pdf
https://github.com/bbbrumley/portsmash
https://linux.oracle.com/cve/CVE-2018-5407.html
https://linux.oracle.com/errata/ELSA-2019-2125.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://security.gentoo.org/glsa/201903-10
https://security.netapp.com/advisory/ntap-20181126-0001/
https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.exploit-db.com/exploits/45785/
https://www.openssl.org/news/secadv/20181112.txt
https://www.openwall.com/lists/oss-security/2018/11/01/4
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
|
| openssl | CVE-2019-1547 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
|
| openssl | CVE-2019-1551 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u5 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
|
| openssl | CVE-2020-1971 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u2 | Expand...
http://www.openwall.com/lists/oss-security/2021/09/14/2
https://access.redhat.com/security/cve/CVE-2020-1971
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
https://linux.oracle.com/cve/CVE-2020-1971.html
https://linux.oracle.com/errata/ELSA-2021-9150.html
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://nvd.nist.gov/vuln/detail/CVE-2020-1971
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
https://security.gentoo.org/glsa/202012-13
https://security.netapp.com/advisory/ntap-20201218-0005/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4662-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2020/dsa-4807
https://www.openssl.org/news/secadv/20201208.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
|
| openssl | CVE-2021-23841 | MEDIUM | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u3 | Expand...
http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
|
| openssl | CVE-2021-4160 | MEDIUM | 1.1.0f-3+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openssl | CVE-2022-1292 | MEDIUM | 1.1.0f-3+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://ubuntu.com/security/notices/USN-5402-1
https://www.openssl.org/news/secadv/20220503.txt
|
| openssl | CVE-2007-6755 | LOW | 1.1.0f-3+deb9u1 | | Expand...
http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
|
| openssl | CVE-2010-0928 | LOW | 1.1.0f-3+deb9u1 | | Expand...
http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
|
| openssl | CVE-2017-3738 | LOW | 1.1.0f-3+deb9u1 | 1.1.0f-3+deb9u2 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/102118
http://www.securitytracker.com/id/1039978
https://access.redhat.com/errata/RHSA-2018:0998
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2017-3738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738
https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a
https://linux.oracle.com/cve/CVE-2017-3738.html
https://linux.oracle.com/errata/ELSA-2018-0998.html
https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20171208-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us
https://ubuntu.com/security/notices/USN-3512-1
https://www.debian.org/security/2017/dsa-4065
https://www.debian.org/security/2018/dsa-4157
https://www.openssl.org/news/secadv/20171207.txt
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-16
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
|
| openssl | CVE-2018-0733 | LOW | 1.1.0f-3+deb9u1 | 1.1.0f-3+deb9u2 | Expand...
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103517
http://www.securitytracker.com/id/1040576
https://access.redhat.com/security/cve/CVE-2018-0733
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f
https://security.gentoo.org/glsa/201811-21
https://security.netapp.com/advisory/ntap-20180330-0002/
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
|
| openssl | CVE-2019-1563 | LOW | 1.1.0f-3+deb9u1 | 1.1.0l-1~deb9u1 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
|
| passwd | CVE-2017-12424 | CRITICAL | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | Expand...
https://access.redhat.com/security/cve/CVE-2017-12424
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424
https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
https://security.gentoo.org/glsa/201710-16
https://ubuntu.com/security/notices/USN-5254-1
|
| passwd | CVE-2017-20002 | HIGH | 1:4.4-4.1 | 1:4.4-4.1+deb9u1 | Expand...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
|
| passwd | CVE-2007-5686 | LOW | 1:4.4-4.1 | | Expand...
http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
|
| passwd | CVE-2013-4235 | LOW | 1:4.4-4.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
|
| passwd | CVE-2018-7169 | LOW | 1:4.4-4.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
|
| passwd | CVE-2019-19882 | LOW | 1:4.4-4.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
|
| perl-base | CVE-2018-18311 | CRITICAL | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u5 | Expand...
http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/106145
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/errata/RHSA-2019:0109
https://access.redhat.com/errata/RHSA-2019:1790
https://access.redhat.com/errata/RHSA-2019:1942
https://access.redhat.com/errata/RHSA-2019:2400
https://access.redhat.com/security/cve/CVE-2018-18311
https://bugzilla.redhat.com/show_bug.cgi?id=1646730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2018-18311.html
https://linux.oracle.com/errata/ELSA-2019-0109.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://metacpan.org/changes/release/SHAY/perl-5.28.1
https://rt.perl.org/Ticket/Display.html?id=133204
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| perl-base | CVE-2018-18312 | CRITICAL | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u5 | Expand...
http://www.securityfocus.com/bid/106179
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/security/cve/CVE-2018-18312
https://bugzilla.redhat.com/show_bug.cgi?id=1646734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://metacpan.org/changes/release/SHAY/perl-5.28.1
https://rt.perl.org/Public/Bug/Display.html?id=133423
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://ubuntu.com/security/notices/USN-3834-1
https://usn.ubuntu.com/3834-1/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2018-18313 | CRITICAL | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u5 | Expand...
http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/security/cve/CVE-2018-18313
https://bugzilla.redhat.com/show_bug.cgi?id=1646738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://rt.perl.org/Ticket/Display.html?id=133192
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2018-18314 | CRITICAL | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u5 | Expand...
http://www.securityfocus.com/bid/106145
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/security/cve/CVE-2018-18314
https://bugzilla.redhat.com/show_bug.cgi?id=1646751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://rt.perl.org/Ticket/Display.html?id=131649
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://ubuntu.com/security/notices/USN-3834-1
https://usn.ubuntu.com/3834-1/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2018-6797 | CRITICAL | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u3 | Expand...
http://www.securitytracker.com/id/1040681
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2018:1192
https://access.redhat.com/security/cve/CVE-2018-6797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797
https://rt.perl.org/Public/Bug/Display.html?id=132227
https://security.gentoo.org/glsa/201909-01
https://ubuntu.com/security/notices/USN-3625-1
https://usn.ubuntu.com/3625-1/
https://www.debian.org/security/2018/dsa-4172
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2018-6913 | CRITICAL | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u3 | Expand...
http://www.securityfocus.com/bid/103953
http://www.securitytracker.com/id/1040681
https://access.redhat.com/security/cve/CVE-2018-6913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913
https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html
https://rt.perl.org/Public/Bug/Display.html?id=131844
https://security.gentoo.org/glsa/201909-01
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.debian.org/security/2018/dsa-4172
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2018-12015 | HIGH | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u4 | Expand...
http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/104423
http://www.securitytracker.com/id/1041048
https://access.redhat.com/errata/RHSA-2019:2097
https://access.redhat.com/security/cve/CVE-2018-12015
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015
https://linux.oracle.com/cve/CVE-2018-12015.html
https://linux.oracle.com/errata/ELSA-2019-2097.html
https://seclists.org/bugtraq/2019/Mar/42
https://security.netapp.com/advisory/ntap-20180927-0001/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3684-1
https://ubuntu.com/security/notices/USN-3684-2
https://usn.ubuntu.com/3684-1/
https://usn.ubuntu.com/3684-2/
https://www.debian.org/security/2018/dsa-4226
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2018-6798 | HIGH | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u3 | Expand...
http://www.securitytracker.com/id/1040681
https://access.redhat.com/errata/RHSA-2018:1192
https://access.redhat.com/security/cve/CVE-2018-6798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798
https://rt.perl.org/Public/Bug/Display.html?id=132063
https://security.gentoo.org/glsa/201909-01
https://ubuntu.com/security/notices/USN-3625-1
https://usn.ubuntu.com/3625-1/
https://www.debian.org/security/2018/dsa-4172
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-base | CVE-2020-10543 | HIGH | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u7 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-base | CVE-2020-10878 | HIGH | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u7 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-base | CVE-2020-12723 | HIGH | 5.24.1-3+deb9u2 | 5.24.1-3+deb9u7 | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-base | CVE-2020-16156 | HIGH | 5.24.1-3+deb9u2 | | Expand...
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
| perl-base | CVE-2011-4116 | LOW | 5.24.1-3+deb9u2 | | Expand...
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
|
| sensible-utils | CVE-2017-17512 | HIGH | 0.0.9 | 0.0.9+deb9u1 | Expand...
http://metadata.ftp-master.debian.org/changelogs/main/s/sensible-utils/sensible-utils_0.0.11_changelog
https://bugs.debian.org/881767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17512
https://lists.debian.org/debian-lts-announce/2017/12/msg00012.html
https://ubuntu.com/security/notices/USN-3584-1
https://usn.ubuntu.com/3584-1/
https://www.debian.org/security/2017/dsa-4071
|
| tar | CVE-2018-20482 | MEDIUM | 1.29b-1.1 | 1.29b-1.1+deb9u1 | Expand...
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://www.securityfocus.com/bid/106354
https://access.redhat.com/security/cve/CVE-2018-20482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482
https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html
https://news.ycombinator.com/item?id=18745431
https://security.gentoo.org/glsa/201903-05
https://twitter.com/thatcks/status/1076166645708668928
https://ubuntu.com/security/notices/USN-4692-1
https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
|
| tar | CVE-2005-2541 | LOW | 1.29b-1.1 | | Expand...
http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
|
| tar | CVE-2019-9923 | LOW | 1.29b-1.1 | | Expand...
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
|
| tar | CVE-2021-20193 | LOW | 1.29b-1.1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
|
| tzdata | DLA-2424-1 | UNKNOWN | 2017c-0+deb9u1 | 2020d-0+deb9u1 | Expand...
|
| tzdata | DLA-2509-1 | UNKNOWN | 2017c-0+deb9u1 | 2020e-0+deb9u1 | Expand...
|
| tzdata | DLA-2542-1 | UNKNOWN | 2017c-0+deb9u1 | 2021a-0+deb9u1 | Expand...
|
| tzdata | DLA-2797-1 | UNKNOWN | 2017c-0+deb9u1 | 2021a-0+deb9u2 | Expand...
|
| tzdata | DLA-2963-1 | UNKNOWN | 2017c-0+deb9u1 | 2021a-0+deb9u3 | Expand...
|
| util-linux | CVE-2016-2779 | HIGH | 2.29.2-1 | | Expand...
http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
|
| util-linux | CVE-2018-7738 | HIGH | 2.29.2-1 | 2.29.2-1+deb9u1 | Expand...
http://www.securityfocus.com/bid/103367
https://access.redhat.com/security/cve/CVE-2018-7738
https://bugs.debian.org/892179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738
https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
https://github.com/karelzak/util-linux/issues/539
https://ubuntu.com/security/notices/USN-4512-1
https://usn.ubuntu.com/4512-1/
https://www.debian.org/security/2018/dsa-4134
|
| util-linux | CVE-2021-37600 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| util-linux | CVE-2022-0563 | LOW | 2.29.2-1 | | Expand...
https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
|
| wget | CVE-2019-5953 | CRITICAL | 1.18-5+deb9u1 | 1.18-5+deb9u3 | Expand...
http://jvn.jp/en/jp/JVN25261088/index.html
https://access.redhat.com/errata/RHSA-2019:2979
https://access.redhat.com/errata/RHSA-2019:3168
https://access.redhat.com/security/cve/CVE-2019-5953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953
https://jvn.jp/en/jp/JVN25261088/
https://linux.oracle.com/cve/CVE-2019-5953.html
https://linux.oracle.com/errata/ELSA-2019-1228.html
https://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html
https://security.gentoo.org/glsa/201908-19
https://support.f5.com/csp/article/K14560101
https://ubuntu.com/security/notices/USN-3943-1
https://ubuntu.com/security/notices/USN-3943-2
https://www.gnu.org/software/wget/
|
| wget | CVE-2018-0494 | MEDIUM | 1.18-5+deb9u1 | 1.18-5+deb9u2 | Expand...
http://www.securityfocus.com/bid/104129
http://www.securitytracker.com/id/1040838
https://access.redhat.com/errata/RHSA-2018:3052
https://access.redhat.com/security/cve/CVE-2018-0494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
https://linux.oracle.com/cve/CVE-2018-0494.html
https://linux.oracle.com/errata/ELSA-2018-3052.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html
https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
https://savannah.gnu.org/bugs/?53763
https://security.gentoo.org/glsa/201806-01
https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt
https://ubuntu.com/security/notices/USN-3643-1
https://ubuntu.com/security/notices/USN-3643-2
https://usn.ubuntu.com/3643-1/
https://usn.ubuntu.com/3643-2/
https://www.debian.org/security/2018/dsa-4195
https://www.exploit-db.com/exploits/44601/
|
| wget | CVE-2021-31879 | MEDIUM | 1.18-5+deb9u1 | | Expand...
https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
|
| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.8.dfsg-5 | 1:1.2.8.dfsg-5+deb9u1 | Expand...
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-1642.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
|