apache2-utils |
CVE-2019-17567 |
MEDIUM |
2.4.41-4ubuntu3.3 |
|
Expand...http://httpd.apache.org/security/vulnerabilities_24.html http://www.openwall.com/lists/oss-security/2021/06/10/2 https://access.redhat.com/security/cve/CVE-2019-17567 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567 https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ https://nvd.nist.gov/vuln/detail/CVE-2019-17567 https://security.gentoo.org/glsa/202107-38 https://security.netapp.com/advisory/ntap-20210702-0001/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
apache2-utils |
CVE-2021-33193 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.5 |
Expand...https://access.redhat.com/security/cve/CVE-2021-33193 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193 https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/ https://nvd.nist.gov/vuln/detail/CVE-2021-33193 https://portswigger.net/research/http2 https://security.netapp.com/advisory/ntap-20210917-0004/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ https://ubuntu.com/security/notices/USN-5090-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.tenable.com/security/tns-2021-17
|
apache2-utils |
CVE-2021-34798 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.5 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html https://access.redhat.com/security/cve/CVE-2021-34798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798 https://kc.mcafee.com/corporate/index?page=content&id=SB10379 https://linux.oracle.com/cve/CVE-2021-34798.html https://linux.oracle.com/errata/ELSA-2022-9005.html https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ https://nvd.nist.gov/vuln/detail/CVE-2021-34798 https://security.netapp.com/advisory/ntap-20211008-0004/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ https://ubuntu.com/security/notices/USN-5090-1 https://ubuntu.com/security/notices/USN-5090-2 https://www.debian.org/security/2021/dsa-4982 https://www.oracle.com/security-alerts/cpujan2022.html https://www.tenable.com/security/tns-2021-17
|
apache2-utils |
CVE-2021-36160 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.5 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html https://access.redhat.com/security/cve/CVE-2021-36160 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160 https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ https://nvd.nist.gov/vuln/detail/CVE-2021-36160 https://security.netapp.com/advisory/ntap-20211008-0004/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ https://ubuntu.com/security/notices/USN-5090-1 https://www.debian.org/security/2021/dsa-4982 https://www.oracle.com/security-alerts/cpujan2022.html
|
apache2-utils |
CVE-2021-39275 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.5 |
Expand...https://access.redhat.com/security/cve/CVE-2021-39275 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275 https://linux.oracle.com/cve/CVE-2021-39275.html https://linux.oracle.com/errata/ELSA-2022-9005.html https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ https://nvd.nist.gov/vuln/detail/CVE-2021-39275 https://security.netapp.com/advisory/ntap-20211008-0004/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ https://ubuntu.com/security/notices/USN-5090-1 https://ubuntu.com/security/notices/USN-5090-2 https://www.debian.org/security/2021/dsa-4982 https://www.oracle.com/security-alerts/cpujan2022.html
|
apache2-utils |
CVE-2021-40438 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-40438 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438 https://linux.oracle.com/cve/CVE-2021-40438.html https://linux.oracle.com/errata/ELSA-2021-3856.html https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ https://nvd.nist.gov/vuln/detail/CVE-2021-40438 https://security.netapp.com/advisory/ntap-20211008-0004/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ https://ubuntu.com/security/notices/USN-5090-1 https://ubuntu.com/security/notices/USN-5090-2 https://ubuntu.com/security/notices/USN-5090-2 (regression update esm) https://ubuntu.com/security/notices/USN-5090-3 (regression update) https://www.debian.org/security/2021/dsa-4982 https://www.oracle.com/security-alerts/cpujan2022.html https://www.tenable.com/security/tns-2021-17
|
apache2-utils |
CVE-2021-44224 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.9 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html http://www.openwall.com/lists/oss-security/2021/12/20/3 https://access.redhat.com/security/cve/CVE-2021-44224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224 https://httpd.apache.org/security/vulnerabilities_24.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ https://nvd.nist.gov/vuln/detail/CVE-2021-44224 https://security.netapp.com/advisory/ntap-20211224-0001/ https://ubuntu.com/security/notices/USN-5212-1 https://ubuntu.com/security/notices/USN-5212-2 https://www.debian.org/security/2022/dsa-5035 https://www.oracle.com/security-alerts/cpujan2022.html https://www.tenable.com/security/tns-2022-01 https://www.tenable.com/security/tns-2022-03
|
apache2-utils |
CVE-2021-44790 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.9 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html http://www.openwall.com/lists/oss-security/2021/12/20/4 https://access.redhat.com/security/cve/CVE-2021-44790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2021-44790.html https://linux.oracle.com/errata/ELSA-2022-0258.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ https://nvd.nist.gov/vuln/detail/CVE-2021-44790 https://security.netapp.com/advisory/ntap-20211224-0001/ https://ubuntu.com/security/notices/USN-5212-1 https://ubuntu.com/security/notices/USN-5212-2 https://www.debian.org/security/2022/dsa-5035 https://www.oracle.com/security-alerts/cpujan2022.html https://www.tenable.com/security/tns-2022-01 https://www.tenable.com/security/tns-2022-03
|
apache2-utils |
CVE-2022-22719 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4 https://access.redhat.com/security/cve/CVE-2022-22719 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ https://nvd.nist.gov/vuln/detail/CVE-2022-22719 https://security.netapp.com/advisory/ntap-20220321-0001/ https://ubuntu.com/security/notices/USN-5333-1 https://ubuntu.com/security/notices/USN-5333-2
|
apache2-utils |
CVE-2022-22720 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3 https://access.redhat.com/security/cve/CVE-2022-22720 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720 https://linux.oracle.com/cve/CVE-2022-22720.html https://linux.oracle.com/errata/ELSA-2022-1049.html https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ https://nvd.nist.gov/vuln/detail/CVE-2022-22720 https://security.netapp.com/advisory/ntap-20220321-0001/ https://ubuntu.com/security/notices/USN-5333-1 https://ubuntu.com/security/notices/USN-5333-2
|
apache2-utils |
CVE-2022-23943 |
MEDIUM |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1 https://access.redhat.com/security/cve/CVE-2022-23943 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ https://nvd.nist.gov/vuln/detail/CVE-2022-23943 https://security.netapp.com/advisory/ntap-20220321-0001/ https://ubuntu.com/security/notices/USN-5333-1 https://ubuntu.com/security/notices/USN-5333-2
|
apache2-utils |
CVE-2022-22721 |
LOW |
2.4.41-4ubuntu3.3 |
2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2 https://access.redhat.com/security/cve/CVE-2022-22721 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ https://nvd.nist.gov/vuln/detail/CVE-2022-22721 https://security.netapp.com/advisory/ntap-20220321-0001/ https://ubuntu.com/security/notices/USN-5333-1 https://ubuntu.com/security/notices/USN-5333-2
|
bash |
CVE-2019-18276 |
LOW |
5.0-6ubuntu1.1 |
|
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://access.redhat.com/security/cve/CVE-2019-18276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-18276 https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://www.youtube.com/watch?v=-wGtxJ8opa8
|
binutils |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
binutils |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
binutils |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
binutils |
CVE-2020-16592 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
binutils |
CVE-2021-3487 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
binutils |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
binutils-common |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
binutils-common |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
binutils-common |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
binutils-common |
CVE-2020-16592 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
binutils-common |
CVE-2021-3487 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
binutils-common |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
binutils-x86-64-linux-gnu |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
binutils-x86-64-linux-gnu |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
binutils-x86-64-linux-gnu |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
binutils-x86-64-linux-gnu |
CVE-2020-16592 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
binutils-x86-64-linux-gnu |
CVE-2021-3487 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
binutils-x86-64-linux-gnu |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
bsdutils |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
bsdutils |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
coreutils |
CVE-2016-2781 |
LOW |
8.30-3ubuntu2 |
|
Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2781
|
cpp |
CVE-2020-13844 |
MEDIUM |
1.185.1ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
cpp-8 |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
cpp-9 |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
curl |
CVE-2021-22924 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22924 https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl |
CVE-2021-22925 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json https://access.redhat.com/security/cve/CVE-2021-22925 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22925.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925 https://hackerone.com/reports/1223882 https://linux.oracle.com/cve/CVE-2021-22925.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22925 https://security.netapp.com/advisory/ntap-20210902-0003/ https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl |
CVE-2021-22946 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-22946 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22946 https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl |
CVE-2021-22947 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-22947 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22947 https://security.netapp.com/advisory/ntap-20211029-0003/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
curl |
CVE-2021-22898 |
LOW |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://access.redhat.com/security/cve/CVE-2021-22898 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-22898 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html
|
dbus |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1
|
dbus-user-session |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1
|
dbus-x11 |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1
|
fdisk |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
fdisk |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
g++ |
CVE-2020-13844 |
MEDIUM |
1.185.1ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
g++-9 |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc |
CVE-2020-13844 |
MEDIUM |
1.185.1ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-8 |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-8-base |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-9 |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-9-base |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gfortran-8 |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gir1.2-gdkpixbuf-2.0 |
CVE-2021-44648 |
MEDIUM |
2.40.0+dfsg-3ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-44648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648 https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/ https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
|
git |
CVE-2018-1000021 |
LOW |
1:2.32.0-1~ppa0~ubuntu20.04.1 |
|
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
git-lfs |
CVE-2021-21237 |
MEDIUM |
2.9.2-1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21237 https://github.com/advisories/GHSA-cx3w-xqmc-84g5 https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a https://github.com/git-lfs/git-lfs/releases/tag/v2.13.2 https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5 https://nvd.nist.gov/vuln/detail/CVE-2021-21237 https://pkg.go.dev/vuln/GO-2021-0098
|
git-man |
CVE-2018-1000021 |
LOW |
1:2.32.0-1~ppa0~ubuntu20.04.1 |
|
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
hdf5-helpers |
CVE-2017-17507 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-17507 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507 https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
|
hdf5-helpers |
CVE-2018-17233 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
|
hdf5-helpers |
CVE-2018-17234 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
|
hdf5-helpers |
CVE-2018-17432 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17432 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
|
hdf5-helpers |
CVE-2018-17433 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
|
hdf5-helpers |
CVE-2018-17434 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
|
hdf5-helpers |
CVE-2018-17437 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
|
hdf5-helpers |
CVE-2018-17438 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17438 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
|
hdf5-helpers |
CVE-2019-8397 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-8397 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397 https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
|
hdf5-helpers |
CVE-2019-9151 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151 https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
|
hdf5-helpers |
CVE-2019-9152 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9152 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152 https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
|
krb5-multidev |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
krb5-multidev |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libapparmor1 |
CVE-2016-1585 |
MEDIUM |
2.13.3-7ubuntu5.1 |
|
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2016-1585
|
libarchive-dev |
CVE-2021-36976 |
MEDIUM |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/27 http://seclists.org/fulldisclosure/2022/Mar/28 http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-36976 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ https://nvd.nist.gov/vuln/detail/CVE-2021-36976 https://support.apple.com/kb/HT213182 https://support.apple.com/kb/HT213183 https://support.apple.com/kb/HT213193 https://ubuntu.com/security/notices/USN-5291-1
|
libarchive-dev |
CVE-2021-23177 |
LOW |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177 https://linux.oracle.com/cve/CVE-2021-23177.html https://linux.oracle.com/errata/ELSA-2022-0892.html https://ubuntu.com/security/notices/USN-5291-1
|
libarchive-dev |
CVE-2021-31566 |
LOW |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-31566 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566 https://linux.oracle.com/cve/CVE-2021-31566.html https://linux.oracle.com/errata/ELSA-2022-0892.html https://ubuntu.com/security/notices/USN-5291-1
|
libarchive-tools |
CVE-2021-36976 |
MEDIUM |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/27 http://seclists.org/fulldisclosure/2022/Mar/28 http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-36976 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ https://nvd.nist.gov/vuln/detail/CVE-2021-36976 https://support.apple.com/kb/HT213182 https://support.apple.com/kb/HT213183 https://support.apple.com/kb/HT213193 https://ubuntu.com/security/notices/USN-5291-1
|
libarchive-tools |
CVE-2021-23177 |
LOW |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177 https://linux.oracle.com/cve/CVE-2021-23177.html https://linux.oracle.com/errata/ELSA-2022-0892.html https://ubuntu.com/security/notices/USN-5291-1
|
libarchive-tools |
CVE-2021-31566 |
LOW |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-31566 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566 https://linux.oracle.com/cve/CVE-2021-31566.html https://linux.oracle.com/errata/ELSA-2022-0892.html https://ubuntu.com/security/notices/USN-5291-1
|
libarchive13 |
CVE-2021-36976 |
MEDIUM |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/27 http://seclists.org/fulldisclosure/2022/Mar/28 http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-36976 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ https://nvd.nist.gov/vuln/detail/CVE-2021-36976 https://support.apple.com/kb/HT213182 https://support.apple.com/kb/HT213183 https://support.apple.com/kb/HT213193 https://ubuntu.com/security/notices/USN-5291-1
|
libarchive13 |
CVE-2021-23177 |
LOW |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177 https://linux.oracle.com/cve/CVE-2021-23177.html https://linux.oracle.com/errata/ELSA-2022-0892.html https://ubuntu.com/security/notices/USN-5291-1
|
libarchive13 |
CVE-2021-31566 |
LOW |
3.4.0-2ubuntu1 |
3.4.0-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-31566 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566 https://linux.oracle.com/cve/CVE-2021-31566.html https://linux.oracle.com/errata/ELSA-2022-0892.html https://ubuntu.com/security/notices/USN-5291-1
|
libasan5 |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libasn1-8-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libbinutils |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
libbinutils |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
libbinutils |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
libbinutils |
CVE-2020-16592 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
libbinutils |
CVE-2021-3487 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
libbinutils |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
libblas-dev |
CVE-2021-4048 |
LOW |
3.9.0-1build1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048 https://github.com/JuliaLang/julia/issues/42415 https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781 https://github.com/Reference-LAPACK/lapack/pull/625 https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41 https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7 https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ https://nvd.nist.gov/vuln/detail/CVE-2021-4048
|
libblas3 |
CVE-2021-4048 |
LOW |
3.9.0-1build1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048 https://github.com/JuliaLang/julia/issues/42415 https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781 https://github.com/Reference-LAPACK/lapack/pull/625 https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41 https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7 https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ https://nvd.nist.gov/vuln/detail/CVE-2021-4048
|
libblkid1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libblkid1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libc-bin |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-bin |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-bin |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-dev-bin |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-dev-bin |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc-dev-bin |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc-dev-bin |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-dev-bin |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc-dev-bin |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-dev-bin |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc-dev-bin |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-dev-bin |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc-dev-bin |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-dev-bin |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc6 |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6-dev |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6-dev |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
libc6-dev |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
libc6-dev |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6-dev |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc6-dev |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc6-dev |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
libc6-dev |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6-dev |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc6-dev |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6-dev |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libcairo-gobject2 |
CVE-2017-7475 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...http://seclists.org/oss-sec/2017/q2/151 https://access.redhat.com/security/cve/CVE-2017-7475 https://bugs.freedesktop.org/show_bug.cgi?id=100763 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475 https://github.com/advisories/GHSA-5v3f-73gv-x7x5 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-7475
|
libcairo-gobject2 |
CVE-2017-9814 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html https://access.redhat.com/security/cve/CVE-2017-9814 https://bugs.freedesktop.org/show_bug.cgi?id=101547 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/201904-01
|
libcairo-gobject2 |
CVE-2018-18064 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-18064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064 https://gitlab.freedesktop.org/cairo/cairo/issues/341 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libcairo-gobject2 |
CVE-2019-6461 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/352 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6461
|
libcairo-gobject2 |
CVE-2019-6462 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/353 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6462
|
libcairo2 |
CVE-2017-7475 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...http://seclists.org/oss-sec/2017/q2/151 https://access.redhat.com/security/cve/CVE-2017-7475 https://bugs.freedesktop.org/show_bug.cgi?id=100763 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475 https://github.com/advisories/GHSA-5v3f-73gv-x7x5 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-7475
|
libcairo2 |
CVE-2017-9814 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html https://access.redhat.com/security/cve/CVE-2017-9814 https://bugs.freedesktop.org/show_bug.cgi?id=101547 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/201904-01
|
libcairo2 |
CVE-2018-18064 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-18064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064 https://gitlab.freedesktop.org/cairo/cairo/issues/341 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libcairo2 |
CVE-2019-6461 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/352 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6461
|
libcairo2 |
CVE-2019-6462 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/353 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6462
|
libcryptsetup12 |
CVE-2021-4122 |
MEDIUM |
2:2.2.2-3ubuntu2.3 |
2:2.2.2-3ubuntu2.4 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4122.json https://access.redhat.com/security/cve/CVE-2021-4122 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122 https://linux.oracle.com/cve/CVE-2021-4122.html https://linux.oracle.com/errata/ELSA-2022-0370.html https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5286-1 https://www.openwall.com/lists/oss-security/2022/01/13/2
|
libctf-nobfd0 |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
libctf-nobfd0 |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
libctf-nobfd0 |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
libctf-nobfd0 |
CVE-2020-16592 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
libctf-nobfd0 |
CVE-2021-3487 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
libctf-nobfd0 |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
libctf0 |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
libctf0 |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
libctf0 |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
libctf0 |
CVE-2020-16592 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
libctf0 |
CVE-2021-3487 |
LOW |
2.34-6ubuntu1.1 |
2.34-6ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
libctf0 |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
libcups2 |
CVE-2019-8842 |
LOW |
2.3.1-9ubuntu1.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT210788
|
libcups2 |
CVE-2020-10001 |
LOW |
2.3.1-9ubuntu1.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-10001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001 https://linux.oracle.com/cve/CVE-2020-10001.html https://linux.oracle.com/errata/ELSA-2021-4393.html https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html https://support.apple.com/en-us/HT212011
|
libcurl3-gnutls |
CVE-2021-22924 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22924 https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl3-gnutls |
CVE-2021-22925 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json https://access.redhat.com/security/cve/CVE-2021-22925 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22925.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925 https://hackerone.com/reports/1223882 https://linux.oracle.com/cve/CVE-2021-22925.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22925 https://security.netapp.com/advisory/ntap-20210902-0003/ https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl3-gnutls |
CVE-2021-22946 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-22946 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22946 https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl3-gnutls |
CVE-2021-22947 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-22947 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22947 https://security.netapp.com/advisory/ntap-20211029-0003/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl3-gnutls |
CVE-2021-22898 |
LOW |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://access.redhat.com/security/cve/CVE-2021-22898 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-22898 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libcurl4 |
CVE-2021-22924 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22924 https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 |
CVE-2021-22925 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json https://access.redhat.com/security/cve/CVE-2021-22925 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22925.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925 https://hackerone.com/reports/1223882 https://linux.oracle.com/cve/CVE-2021-22925.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22925 https://security.netapp.com/advisory/ntap-20210902-0003/ https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 |
CVE-2021-22946 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-22946 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22946 https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 |
CVE-2021-22947 |
MEDIUM |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/security/cve/CVE-2021-22947 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22947 https://security.netapp.com/advisory/ntap-20211029-0003/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libcurl4 |
CVE-2021-22898 |
LOW |
7.68.0-1ubuntu2.5 |
7.68.0-1ubuntu2.6 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://access.redhat.com/security/cve/CVE-2021-22898 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-22898 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libdbus-1-3 |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1
|
libexempi8 |
CVE-2018-12648 |
LOW |
2.5.1-1build1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00070.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00075.html https://access.redhat.com/security/cve/CVE-2018-12648 https://bugs.freedesktop.org/show_bug.cgi?id=106981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12648
|
libexiv2-27 |
CVE-2021-32815 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-32815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32815 https://github.com/Exiv2/exiv2/pull/1739 https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-32815 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-34334 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-34334 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34334 https://github.com/Exiv2/exiv2/pull/1766 https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-34334 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-34335 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-34335 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34335 https://github.com/Exiv2/exiv2/pull/1750 https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-34335 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37615 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37615 https://github.com/Exiv2/exiv2/pull/1758 https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37615 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37616 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37616 https://github.com/Exiv2/exiv2/pull/1758 https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37616 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37618 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37618 https://github.com/Exiv2/exiv2/pull/1759 https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2 https://linux.oracle.com/cve/CVE-2021-37618.html https://linux.oracle.com/errata/ELSA-2021-4319.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37618 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37619 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37619 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37619 https://github.com/Exiv2/exiv2/pull/1752 https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v https://linux.oracle.com/cve/CVE-2021-37619.html https://linux.oracle.com/errata/ELSA-2021-4319.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37619 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37620 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37620 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620 https://github.com/Exiv2/exiv2/pull/1769 https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37620 https://ubuntu.com/security/notices/USN-5043-1 https://ubuntu.com/security/notices/USN-5043-2
|
libexiv2-27 |
CVE-2021-37621 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37621 https://github.com/Exiv2/exiv2/pull/1778 https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37621 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37622 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37622 https://github.com/Exiv2/exiv2/pull/1788 https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37622 https://ubuntu.com/security/notices/USN-5043-1
|
libexiv2-27 |
CVE-2021-37623 |
MEDIUM |
0.27.2-8ubuntu2.4 |
0.27.2-8ubuntu2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37623 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37623 https://github.com/Exiv2/exiv2/pull/1790 https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ https://nvd.nist.gov/vuln/detail/CVE-2021-37623 https://ubuntu.com/security/notices/USN-5043-1
|
libexpat1 |
CVE-2022-25235 |
HIGH |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25235 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235 https://github.com/libexpat/libexpat/pull/562 https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix) https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests) https://linux.oracle.com/cve/CVE-2022-25235.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25235 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2022-25236 |
HIGH |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25236 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236 https://github.com/libexpat/libexpat/pull/561 https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test) https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix) https://github.com/libexpat/libexpat/pull/577 https://linux.oracle.com/cve/CVE-2022-25236.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25236 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2021-46143 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2021-46143 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143 https://github.com/libexpat/libexpat/issues/532 https://github.com/libexpat/libexpat/pull/538 https://linux.oracle.com/cve/CVE-2021-46143.html https://linux.oracle.com/errata/ELSA-2022-9227.html https://nvd.nist.gov/vuln/detail/CVE-2021-46143 https://security.netapp.com/advisory/ntap-20220121-0006/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22822 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22822.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22822 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22823 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22823 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22823.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22823 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22824 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22824.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22824 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22825 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22825.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22825 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22826 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22826 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22826.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22826 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22827 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22827 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22827.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22827 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-23852 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852 https://github.com/libexpat/libexpat/pull/550 https://linux.oracle.com/cve/CVE-2022-23852.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://nvd.nist.gov/vuln/detail/CVE-2022-23852 https://security.netapp.com/advisory/ntap-20220217-0001/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-23990 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23990 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990 https://github.com/libexpat/libexpat/pull/551 https://linux.oracle.com/cve/CVE-2022-23990.html https://linux.oracle.com/errata/ELSA-2022-9232.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/ https://nvd.nist.gov/vuln/detail/CVE-2022-23990 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-25313 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25313 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313 https://github.com/libexpat/libexpat/pull/558 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25313 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2022-25314 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25314 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314 https://github.com/libexpat/libexpat/pull/560 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25314 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2022-25315 |
MEDIUM |
2.2.9-1build1 |
2.2.9-1ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25315 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315 https://github.com/libexpat/libexpat/pull/559 https://linux.oracle.com/cve/CVE-2022-25315.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25315 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085
|
libexpat1 |
CVE-2021-45960 |
LOW |
2.2.9-1build1 |
2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2021-45960 https://bugzilla.mozilla.org/show_bug.cgi?id=1217609 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960 https://github.com/libexpat/libexpat/issues/531 https://github.com/libexpat/libexpat/pull/534 https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea https://linux.oracle.com/cve/CVE-2021-45960.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2021-45960 https://security.netapp.com/advisory/ntap-20220121-0004/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libfdisk1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libfdisk1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libflac8 |
CVE-2020-0499 |
LOW |
1.3.3-1build1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-0499 https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/ https://source.android.com/security/bulletin/pixel/2020-12-01
|
libgcc-8-dev |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libgcc-9-dev |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libgcrypt20 |
CVE-2021-40528 |
MEDIUM |
1.8.5-5ubuntu1 |
1.8.5-5ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-40528 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528 https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13 https://eprint.iacr.org/2021/923 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320 https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 https://nvd.nist.gov/vuln/detail/CVE-2021-40528 https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2
|
libgcrypt20 |
CVE-2021-33560 |
LOW |
1.8.5-5ubuntu1 |
1.8.5-5ubuntu1.1 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json https://access.redhat.com/security/cve/CVE-2021-33560 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328 https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://eprint.iacr.org/2021/923 https://linux.oracle.com/cve/CVE-2021-33560.html https://linux.oracle.com/errata/ELSA-2021-4409.html https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/ https://nvd.nist.gov/vuln/detail/CVE-2021-33560 https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgd3 |
CVE-2021-40145 |
MEDIUM |
2.2.5-5.2ubuntu2 |
2.2.5-5.2ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145 https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af https://github.com/libgd/libgd/issues/700 https://github.com/libgd/libgd/pull/713 https://nvd.nist.gov/vuln/detail/CVE-2021-40145 https://ubuntu.com/security/notices/USN-5068-1
|
libgd3 |
CVE-2017-6363 |
LOW |
2.2.5-5.2ubuntu2 |
2.2.5-5.2ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363 https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397 https://github.com/libgd/libgd/issues/383 https://ubuntu.com/security/notices/USN-5068-1
|
libgd3 |
CVE-2021-38115 |
LOW |
2.2.5-5.2ubuntu2 |
2.2.5-5.2ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115 https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032 https://github.com/libgd/libgd/issues/697 https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032 https://nvd.nist.gov/vuln/detail/CVE-2021-38115 https://ubuntu.com/security/notices/USN-5068-1
|
libgd3 |
CVE-2021-40812 |
LOW |
2.2.5-5.2ubuntu2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812 https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9 https://github.com/libgd/libgd/issues/750#issuecomment-914872385 https://github.com/libgd/libgd/issues/757 https://nvd.nist.gov/vuln/detail/CVE-2021-40812
|
libgdk-pixbuf2.0-0 |
CVE-2021-44648 |
MEDIUM |
2.40.0+dfsg-3ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-44648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648 https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/ https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
|
libgdk-pixbuf2.0-common |
CVE-2021-44648 |
MEDIUM |
2.40.0+dfsg-3ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-44648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648 https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/ https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
|
libgfortran-8-dev |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libgif7 |
CVE-2020-23922 |
LOW |
5.1.9-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-23922 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceforge.net/p/giflib/bugs/151/
|
libgmp10 |
CVE-2021-43618 |
LOW |
2:6.2.0+dfsg-4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-43618 https://bugs.debian.org/994405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2021-43618
|
libgnutls30 |
CVE-2021-20231 |
LOW |
3.6.13-2ubuntu1.3 |
3.6.13-2ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20231 https://bugzilla.redhat.com/show_bug.cgi?id=1922276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231 https://linux.oracle.com/cve/CVE-2021-20231.html https://linux.oracle.com/errata/ELSA-2022-9221.html https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/ https://nvd.nist.gov/vuln/detail/CVE-2021-20231 https://security.netapp.com/advisory/ntap-20210416-0005/ https://ubuntu.com/security/notices/USN-5029-1 https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
|
libgnutls30 |
CVE-2021-20232 |
LOW |
3.6.13-2ubuntu1.3 |
3.6.13-2ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20232 https://bugzilla.redhat.com/show_bug.cgi?id=1922275 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232 https://linux.oracle.com/cve/CVE-2021-20232.html https://linux.oracle.com/errata/ELSA-2022-9221.html https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/ https://nvd.nist.gov/vuln/detail/CVE-2021-20232 https://security.netapp.com/advisory/ntap-20210416-0005/ https://ubuntu.com/security/notices/USN-5029-1 https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
|
libgssapi-krb5-2 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgssapi-krb5-2 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libgssapi3-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libgssrpc4 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgssrpc4 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libgxps2 |
CVE-2018-10767 |
LOW |
0.3.1-1 |
|
Expand...https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3140 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/security/cve/CVE-2018-10767 https://bugzilla.redhat.com/show_bug.cgi?id=1575188 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767 https://linux.oracle.com/cve/CVE-2018-10767.html https://linux.oracle.com/errata/ELSA-2018-3140.html
|
libhcrypto4-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhdf5-103 |
CVE-2017-17507 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-17507 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507 https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
|
libhdf5-103 |
CVE-2018-17233 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
|
libhdf5-103 |
CVE-2018-17234 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
|
libhdf5-103 |
CVE-2018-17432 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17432 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
|
libhdf5-103 |
CVE-2018-17433 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
|
libhdf5-103 |
CVE-2018-17434 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
|
libhdf5-103 |
CVE-2018-17437 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
|
libhdf5-103 |
CVE-2018-17438 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17438 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
|
libhdf5-103 |
CVE-2019-8397 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-8397 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397 https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
|
libhdf5-103 |
CVE-2019-9151 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151 https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
|
libhdf5-103 |
CVE-2019-9152 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9152 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152 https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
|
libhdf5-cpp-103 |
CVE-2017-17507 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-17507 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507 https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
|
libhdf5-cpp-103 |
CVE-2018-17233 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
|
libhdf5-cpp-103 |
CVE-2018-17234 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
|
libhdf5-cpp-103 |
CVE-2018-17432 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17432 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
|
libhdf5-cpp-103 |
CVE-2018-17433 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
|
libhdf5-cpp-103 |
CVE-2018-17434 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
|
libhdf5-cpp-103 |
CVE-2018-17437 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
|
libhdf5-cpp-103 |
CVE-2018-17438 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17438 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
|
libhdf5-cpp-103 |
CVE-2019-8397 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-8397 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397 https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
|
libhdf5-cpp-103 |
CVE-2019-9151 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151 https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
|
libhdf5-cpp-103 |
CVE-2019-9152 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9152 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152 https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
|
libhdf5-dev |
CVE-2017-17507 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-17507 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507 https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
|
libhdf5-dev |
CVE-2018-17233 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
|
libhdf5-dev |
CVE-2018-17234 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
|
libhdf5-dev |
CVE-2018-17432 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17432 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
|
libhdf5-dev |
CVE-2018-17433 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
|
libhdf5-dev |
CVE-2018-17434 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
|
libhdf5-dev |
CVE-2018-17437 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
|
libhdf5-dev |
CVE-2018-17438 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-17438 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438 https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
|
libhdf5-dev |
CVE-2019-8397 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-8397 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397 https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
|
libhdf5-dev |
CVE-2019-9151 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151 https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
|
libhdf5-dev |
CVE-2019-9152 |
MEDIUM |
1.10.4+repack-11ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9152 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152 https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
|
libheimbase1-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimntlm0-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhx509-5-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libicu66 |
CVE-2021-30535 |
MEDIUM |
66.1-2ubuntu2 |
66.1-2ubuntu2.1 |
Expand...https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html https://crbug.com/1194899 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535 https://github.com/unicode-org/icu/pull/1698 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/ https://ubuntu.com/security/notices/USN-5156-1
|
libjbig-dev |
CVE-2017-9937 |
LOW |
2.1-3.1build1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://access.redhat.com/security/cve/CVE-2017-9937 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjbig0 |
CVE-2017-9937 |
LOW |
2.1-3.1build1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://access.redhat.com/security/cve/CVE-2017-9937 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjpeg-turbo8 |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libjpeg-turbo8-dev |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libk5crypto3 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libk5crypto3 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkadm5clnt-mit11 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkadm5clnt-mit11 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkadm5srv-mit11 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkadm5srv-mit11 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkdb5-9 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkdb5-9 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5-26-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libkrb5-3 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5-3 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5-dev |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5-dev |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libkrb5support0 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5support0 |
CVE-2018-5709 |
LOW |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-5709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
liblapack-dev |
CVE-2021-4048 |
LOW |
3.9.0-1build1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048 https://github.com/JuliaLang/julia/issues/42415 https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781 https://github.com/Reference-LAPACK/lapack/pull/625 https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41 https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7 https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ https://nvd.nist.gov/vuln/detail/CVE-2021-4048
|
liblapack3 |
CVE-2021-4048 |
LOW |
3.9.0-1build1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048 https://github.com/JuliaLang/julia/issues/42415 https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781 https://github.com/Reference-LAPACK/lapack/pull/625 https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41 https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7 https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ https://nvd.nist.gov/vuln/detail/CVE-2021-4048
|
liblept5 |
CVE-2020-36278 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36278 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278 https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
liblept5 |
CVE-2020-36279 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36279 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279 https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
liblept5 |
CVE-2020-36280 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36280 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280 https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
liblept5 |
CVE-2020-36281 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36281 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281 https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36278 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36278 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278 https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36279 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36279 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279 https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36280 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36280 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280 https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36281 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36281 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281 https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libmount1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libmount1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libmpx2 |
CVE-2020-13844 |
MEDIUM |
8.4.0-3ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libmysqlclient-dev |
CVE-2021-2339 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2339 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339 https://linux.oracle.com/cve/CVE-2021-2339.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2339 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2340 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340 https://linux.oracle.com/cve/CVE-2021-2340.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2340 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2342 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342 https://linux.oracle.com/cve/CVE-2021-2342.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2352 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352 https://linux.oracle.com/cve/CVE-2021-2352.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2352 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2354 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354 https://linux.oracle.com/cve/CVE-2021-2354.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2354 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2356 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2356 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356 https://linux.oracle.com/cve/CVE-2021-2356.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2356 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2357 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357 https://linux.oracle.com/cve/CVE-2021-2357.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2357 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2367 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367 https://linux.oracle.com/cve/CVE-2021-2367.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2370 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2370 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370 https://linux.oracle.com/cve/CVE-2021-2370.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2372 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2372 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372 https://linux.oracle.com/cve/CVE-2021-2372.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-2 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2374 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2374 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374 https://linux.oracle.com/cve/CVE-2021-2374.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2383 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2383 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383 https://linux.oracle.com/cve/CVE-2021-2383.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2384 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384 https://linux.oracle.com/cve/CVE-2021-2384.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2385 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2385 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385 https://linux.oracle.com/cve/CVE-2021-2385.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2387 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2387 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387 https://linux.oracle.com/cve/CVE-2021-2387.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2389 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2389 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389 https://linux.oracle.com/cve/CVE-2021-2389.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-2 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html https://www.zerodayinitiative.com/advisories/ZDI-21-880/
|
libmysqlclient-dev |
CVE-2021-2390 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2390 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390 https://linux.oracle.com/cve/CVE-2021-2390.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html https://www.zerodayinitiative.com/advisories/ZDI-21-881/
|
libmysqlclient-dev |
CVE-2021-2399 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2399 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399 https://linux.oracle.com/cve/CVE-2021-2399.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2402 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402 https://linux.oracle.com/cve/CVE-2021-2402.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2410 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2410 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410 https://linux.oracle.com/cve/CVE-2021-2410.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2417 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417 https://linux.oracle.com/cve/CVE-2021-2417.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2418 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418 https://linux.oracle.com/cve/CVE-2021-2418.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2422 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422 https://linux.oracle.com/cve/CVE-2021-2422.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2424 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2424 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424 https://linux.oracle.com/cve/CVE-2021-2424.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2425 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2425 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425 https://linux.oracle.com/cve/CVE-2021-2425.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2426 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2426 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426 https://linux.oracle.com/cve/CVE-2021-2426.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2427 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2427 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427 https://linux.oracle.com/cve/CVE-2021-2427.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2429 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429 https://linux.oracle.com/cve/CVE-2021-2429.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html https://www.zerodayinitiative.com/advisories/ZDI-21-889/
|
libmysqlclient-dev |
CVE-2021-2437 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437 https://linux.oracle.com/cve/CVE-2021-2437.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2440 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440 https://linux.oracle.com/cve/CVE-2021-2440.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2441 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2441 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441 https://linux.oracle.com/cve/CVE-2021-2441.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient-dev |
CVE-2021-2471 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471 https://nvd.nist.gov/vuln/detail/CVE-2021-2471 https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-2478 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-2478 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-2479 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-2479 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-2481 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-2481 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35537 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537 https://nvd.nist.gov/vuln/detail/CVE-2021-35537 https://security.netapp.com/advisory/ntap-20211022-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35546 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35546 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35546 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35575 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35575 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35577 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35577 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35583 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583 https://security.netapp.com/advisory/ntap-20211022-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35584 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35591 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35591 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35591 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35596 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35596 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35596 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35597 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35597 https://security.netapp.com/advisory/ntap-20211022-0005/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35602 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35602 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35602 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35604 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://ubuntu.com/security/notices/USN-5123-2 https://ubuntu.com/security/notices/USN-5170-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35607 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35607 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35607 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35608 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35608 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35608 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35610 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35610 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35612 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612 https://nvd.nist.gov/vuln/detail/CVE-2021-35612 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35613 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35622 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622 https://nvd.nist.gov/vuln/detail/CVE-2021-35622 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35623 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35623 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623 https://nvd.nist.gov/vuln/detail/CVE-2021-35623 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35624 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624 https://nvd.nist.gov/vuln/detail/CVE-2021-35624 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://ubuntu.com/security/notices/USN-5123-2 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35625 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35625 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625 https://nvd.nist.gov/vuln/detail/CVE-2021-35625 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35626 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626 https://nvd.nist.gov/vuln/detail/CVE-2021-35626 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35627 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627 https://nvd.nist.gov/vuln/detail/CVE-2021-35627 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35628 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35628 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628 https://nvd.nist.gov/vuln/detail/CVE-2021-35628 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35629 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629 https://nvd.nist.gov/vuln/detail/CVE-2021-35629 https://security.netapp.com/advisory/ntap-20211022-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35630 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630 https://nvd.nist.gov/vuln/detail/CVE-2021-35630 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35631 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631 https://nvd.nist.gov/vuln/detail/CVE-2021-35631 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35632 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35632 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632 https://nvd.nist.gov/vuln/detail/CVE-2021-35632 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35633 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35633 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633 https://nvd.nist.gov/vuln/detail/CVE-2021-35633 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35634 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35634 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634 https://nvd.nist.gov/vuln/detail/CVE-2021-35634 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35635 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635 https://nvd.nist.gov/vuln/detail/CVE-2021-35635 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35636 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636 https://nvd.nist.gov/vuln/detail/CVE-2021-35636 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35637 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35637 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637 https://nvd.nist.gov/vuln/detail/CVE-2021-35637 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35638 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35638 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638 https://nvd.nist.gov/vuln/detail/CVE-2021-35638 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35639 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35639 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35640 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640 https://nvd.nist.gov/vuln/detail/CVE-2021-35640 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35641 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641 https://nvd.nist.gov/vuln/detail/CVE-2021-35641 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35642 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642 https://nvd.nist.gov/vuln/detail/CVE-2021-35642 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35643 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643 https://nvd.nist.gov/vuln/detail/CVE-2021-35643 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35644 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644 https://nvd.nist.gov/vuln/detail/CVE-2021-35644 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35645 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645 https://nvd.nist.gov/vuln/detail/CVE-2021-35645 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35646 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646 https://nvd.nist.gov/vuln/detail/CVE-2021-35646 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35647 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647 https://nvd.nist.gov/vuln/detail/CVE-2021-35647 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-35648 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648 https://nvd.nist.gov/vuln/detail/CVE-2021-35648 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient-dev |
CVE-2021-46322 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322 https://github.com/svaarala/duktape/issues/2448
|
libmysqlclient-dev |
CVE-2022-21245 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21245 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245 https://nvd.nist.gov/vuln/detail/CVE-2022-21245 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21249 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249 https://nvd.nist.gov/vuln/detail/CVE-2022-21249 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21253 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253 https://nvd.nist.gov/vuln/detail/CVE-2022-21253 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21254 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254 https://nvd.nist.gov/vuln/detail/CVE-2022-21254 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21256 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21256 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256 https://nvd.nist.gov/vuln/detail/CVE-2022-21256 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21264 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21264 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264 https://nvd.nist.gov/vuln/detail/CVE-2022-21264 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21265 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265 https://nvd.nist.gov/vuln/detail/CVE-2022-21265 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21270 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21270 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270 https://nvd.nist.gov/vuln/detail/CVE-2022-21270 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21278 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21278 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278 https://nvd.nist.gov/vuln/detail/CVE-2022-21278 https://security.netapp.com/advisory/ntap-20220121-0008/ https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21297 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21297 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297 https://nvd.nist.gov/vuln/detail/CVE-2022-21297 https://security.netapp.com/advisory/ntap-20220121-0008/ https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21301 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301 https://nvd.nist.gov/vuln/detail/CVE-2022-21301 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21302 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302 https://nvd.nist.gov/vuln/detail/CVE-2022-21302 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21303 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303 https://nvd.nist.gov/vuln/detail/CVE-2022-21303 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21304 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304 https://nvd.nist.gov/vuln/detail/CVE-2022-21304 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21339 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21339 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339 https://nvd.nist.gov/vuln/detail/CVE-2022-21339 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21342 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342 https://nvd.nist.gov/vuln/detail/CVE-2022-21342 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21344 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21344 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344 https://nvd.nist.gov/vuln/detail/CVE-2022-21344 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21348 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21348 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348 https://nvd.nist.gov/vuln/detail/CVE-2022-21348 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21351 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351 https://nvd.nist.gov/vuln/detail/CVE-2022-21351 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21352 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352 https://nvd.nist.gov/vuln/detail/CVE-2022-21352 https://security.netapp.com/advisory/ntap-20220121-0008/ https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21358 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21358 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358 https://nvd.nist.gov/vuln/detail/CVE-2022-21358 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21362 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362 https://nvd.nist.gov/vuln/detail/CVE-2022-21362 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21367 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367 https://nvd.nist.gov/vuln/detail/CVE-2022-21367 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21368 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368 https://nvd.nist.gov/vuln/detail/CVE-2022-21368 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21370 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21370 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370 https://nvd.nist.gov/vuln/detail/CVE-2022-21370 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21372 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21372 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372 https://nvd.nist.gov/vuln/detail/CVE-2022-21372 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21374 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21374 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374 https://nvd.nist.gov/vuln/detail/CVE-2022-21374 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21378 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378 https://nvd.nist.gov/vuln/detail/CVE-2022-21378 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient-dev |
CVE-2022-21379 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2021-2339 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2339 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339 https://linux.oracle.com/cve/CVE-2021-2339.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2339 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2340 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340 https://linux.oracle.com/cve/CVE-2021-2340.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2340 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2342 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342 https://linux.oracle.com/cve/CVE-2021-2342.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2352 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352 https://linux.oracle.com/cve/CVE-2021-2352.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2352 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2354 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354 https://linux.oracle.com/cve/CVE-2021-2354.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2354 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2356 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2356 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356 https://linux.oracle.com/cve/CVE-2021-2356.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2356 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2357 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357 https://linux.oracle.com/cve/CVE-2021-2357.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://nvd.nist.gov/vuln/detail/CVE-2021-2357 https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2367 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367 https://linux.oracle.com/cve/CVE-2021-2367.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2370 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2370 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370 https://linux.oracle.com/cve/CVE-2021-2370.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2372 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2372 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372 https://linux.oracle.com/cve/CVE-2021-2372.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-2 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2374 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2374 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374 https://linux.oracle.com/cve/CVE-2021-2374.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2383 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2383 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383 https://linux.oracle.com/cve/CVE-2021-2383.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2384 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384 https://linux.oracle.com/cve/CVE-2021-2384.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2385 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2385 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385 https://linux.oracle.com/cve/CVE-2021-2385.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2387 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2387 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387 https://linux.oracle.com/cve/CVE-2021-2387.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2389 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2389 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389 https://linux.oracle.com/cve/CVE-2021-2389.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-2 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html https://www.zerodayinitiative.com/advisories/ZDI-21-880/
|
libmysqlclient21 |
CVE-2021-2390 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2390 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390 https://linux.oracle.com/cve/CVE-2021-2390.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://ubuntu.com/security/notices/USN-5022-3 https://www.oracle.com/security-alerts/cpujul2021.html https://www.zerodayinitiative.com/advisories/ZDI-21-881/
|
libmysqlclient21 |
CVE-2021-2399 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2399 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399 https://linux.oracle.com/cve/CVE-2021-2399.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2402 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402 https://linux.oracle.com/cve/CVE-2021-2402.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2410 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2410 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410 https://linux.oracle.com/cve/CVE-2021-2410.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2417 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417 https://linux.oracle.com/cve/CVE-2021-2417.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2418 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418 https://linux.oracle.com/cve/CVE-2021-2418.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2422 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422 https://linux.oracle.com/cve/CVE-2021-2422.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2424 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2424 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424 https://linux.oracle.com/cve/CVE-2021-2424.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2425 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2425 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425 https://linux.oracle.com/cve/CVE-2021-2425.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2426 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2426 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426 https://linux.oracle.com/cve/CVE-2021-2426.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2427 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2427 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427 https://linux.oracle.com/cve/CVE-2021-2427.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2429 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429 https://linux.oracle.com/cve/CVE-2021-2429.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html https://www.zerodayinitiative.com/advisories/ZDI-21-889/
|
libmysqlclient21 |
CVE-2021-2437 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437 https://linux.oracle.com/cve/CVE-2021-2437.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2440 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440 https://linux.oracle.com/cve/CVE-2021-2440.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2441 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2441 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441 https://linux.oracle.com/cve/CVE-2021-2441.html https://linux.oracle.com/errata/ELSA-2021-3590.html https://security.netapp.com/advisory/ntap-20210723-0001/ https://ubuntu.com/security/notices/USN-5022-1 https://www.oracle.com/security-alerts/cpujul2021.html
|
libmysqlclient21 |
CVE-2021-2471 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471 https://nvd.nist.gov/vuln/detail/CVE-2021-2471 https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-2478 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-2478 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-2479 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-2479 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-2481 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-2481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-2481 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35537 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537 https://nvd.nist.gov/vuln/detail/CVE-2021-35537 https://security.netapp.com/advisory/ntap-20211022-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35546 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35546 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35546 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35575 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35575 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35577 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35577 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35583 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583 https://security.netapp.com/advisory/ntap-20211022-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35584 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35591 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35591 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35591 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35596 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35596 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35596 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35597 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35597 https://security.netapp.com/advisory/ntap-20211022-0005/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35602 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35602 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35602 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35604 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://ubuntu.com/security/notices/USN-5123-2 https://ubuntu.com/security/notices/USN-5170-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35607 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35607 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35607 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35608 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35608 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35608 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35610 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/ https://nvd.nist.gov/vuln/detail/CVE-2021-35610 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35612 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612 https://nvd.nist.gov/vuln/detail/CVE-2021-35612 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35613 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35622 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622 https://nvd.nist.gov/vuln/detail/CVE-2021-35622 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35623 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35623 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623 https://nvd.nist.gov/vuln/detail/CVE-2021-35623 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35624 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624 https://nvd.nist.gov/vuln/detail/CVE-2021-35624 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://ubuntu.com/security/notices/USN-5123-2 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35625 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35625 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625 https://nvd.nist.gov/vuln/detail/CVE-2021-35625 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35626 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626 https://nvd.nist.gov/vuln/detail/CVE-2021-35626 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35627 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627 https://nvd.nist.gov/vuln/detail/CVE-2021-35627 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35628 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35628 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628 https://nvd.nist.gov/vuln/detail/CVE-2021-35628 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35629 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.26-0ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629 https://nvd.nist.gov/vuln/detail/CVE-2021-35629 https://security.netapp.com/advisory/ntap-20211022-0003/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35630 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630 https://nvd.nist.gov/vuln/detail/CVE-2021-35630 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35631 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631 https://nvd.nist.gov/vuln/detail/CVE-2021-35631 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35632 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35632 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632 https://nvd.nist.gov/vuln/detail/CVE-2021-35632 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35633 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35633 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633 https://nvd.nist.gov/vuln/detail/CVE-2021-35633 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35634 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35634 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634 https://nvd.nist.gov/vuln/detail/CVE-2021-35634 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35635 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635 https://nvd.nist.gov/vuln/detail/CVE-2021-35635 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35636 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636 https://nvd.nist.gov/vuln/detail/CVE-2021-35636 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35637 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35637 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637 https://nvd.nist.gov/vuln/detail/CVE-2021-35637 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35638 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35638 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638 https://nvd.nist.gov/vuln/detail/CVE-2021-35638 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35639 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35639 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35640 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640 https://nvd.nist.gov/vuln/detail/CVE-2021-35640 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35641 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641 https://nvd.nist.gov/vuln/detail/CVE-2021-35641 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35642 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642 https://nvd.nist.gov/vuln/detail/CVE-2021-35642 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35643 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643 https://nvd.nist.gov/vuln/detail/CVE-2021-35643 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35644 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644 https://nvd.nist.gov/vuln/detail/CVE-2021-35644 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35645 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645 https://nvd.nist.gov/vuln/detail/CVE-2021-35645 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35646 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646 https://nvd.nist.gov/vuln/detail/CVE-2021-35646 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35647 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647 https://nvd.nist.gov/vuln/detail/CVE-2021-35647 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-35648 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648 https://nvd.nist.gov/vuln/detail/CVE-2021-35648 https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5123-1 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libmysqlclient21 |
CVE-2021-46322 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322 https://github.com/svaarala/duktape/issues/2448
|
libmysqlclient21 |
CVE-2022-21245 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21245 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245 https://nvd.nist.gov/vuln/detail/CVE-2022-21245 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21249 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249 https://nvd.nist.gov/vuln/detail/CVE-2022-21249 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21253 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253 https://nvd.nist.gov/vuln/detail/CVE-2022-21253 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21254 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254 https://nvd.nist.gov/vuln/detail/CVE-2022-21254 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21256 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21256 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256 https://nvd.nist.gov/vuln/detail/CVE-2022-21256 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21264 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21264 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264 https://nvd.nist.gov/vuln/detail/CVE-2022-21264 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21265 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265 https://nvd.nist.gov/vuln/detail/CVE-2022-21265 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21270 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21270 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270 https://nvd.nist.gov/vuln/detail/CVE-2022-21270 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21278 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21278 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278 https://nvd.nist.gov/vuln/detail/CVE-2022-21278 https://security.netapp.com/advisory/ntap-20220121-0008/ https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21297 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21297 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297 https://nvd.nist.gov/vuln/detail/CVE-2022-21297 https://security.netapp.com/advisory/ntap-20220121-0008/ https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21301 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301 https://nvd.nist.gov/vuln/detail/CVE-2022-21301 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21302 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302 https://nvd.nist.gov/vuln/detail/CVE-2022-21302 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21303 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303 https://nvd.nist.gov/vuln/detail/CVE-2022-21303 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21304 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304 https://nvd.nist.gov/vuln/detail/CVE-2022-21304 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21339 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21339 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339 https://nvd.nist.gov/vuln/detail/CVE-2022-21339 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21342 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342 https://nvd.nist.gov/vuln/detail/CVE-2022-21342 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21344 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21344 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344 https://nvd.nist.gov/vuln/detail/CVE-2022-21344 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21348 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21348 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348 https://nvd.nist.gov/vuln/detail/CVE-2022-21348 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21351 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351 https://nvd.nist.gov/vuln/detail/CVE-2022-21351 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21352 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.27-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352 https://nvd.nist.gov/vuln/detail/CVE-2022-21352 https://security.netapp.com/advisory/ntap-20220121-0008/ https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21358 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21358 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358 https://nvd.nist.gov/vuln/detail/CVE-2022-21358 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21362 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362 https://nvd.nist.gov/vuln/detail/CVE-2022-21362 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21367 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367 https://nvd.nist.gov/vuln/detail/CVE-2022-21367 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://ubuntu.com/security/notices/USN-5270-2 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21368 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368 https://nvd.nist.gov/vuln/detail/CVE-2022-21368 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21370 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21370 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370 https://nvd.nist.gov/vuln/detail/CVE-2022-21370 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21372 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21372 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372 https://nvd.nist.gov/vuln/detail/CVE-2022-21372 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21374 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21374 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374 https://nvd.nist.gov/vuln/detail/CVE-2022-21374 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21378 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378 https://nvd.nist.gov/vuln/detail/CVE-2022-21378 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libmysqlclient21 |
CVE-2022-21379 |
MEDIUM |
8.0.25-0ubuntu0.20.04.1 |
8.0.28-0ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379 https://security.netapp.com/advisory/ntap-20220121-0008/ https://ubuntu.com/security/notices/USN-5270-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
libnss3 |
CVE-2021-43527 |
HIGH |
2:3.49.1-1ubuntu1.5 |
2:3.49.1-1ubuntu1.6 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json https://access.redhat.com/security/cve/CVE-2021-43527 https://bugzilla.mozilla.org/show_bug.cgi?id=1737470 https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527 https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/ https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/ https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html https://linux.oracle.com/cve/CVE-2021-43527.html https://linux.oracle.com/errata/ELSA-2021-9591.html https://nvd.nist.gov/vuln/detail/CVE-2021-43527 https://security.netapp.com/advisory/ntap-20211229-0002/ https://ubuntu.com/security/notices/USN-5168-1 https://ubuntu.com/security/notices/USN-5168-2 https://ubuntu.com/security/notices/USN-5168-3 https://ubuntu.com/security/notices/USN-5168-4 https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/ https://www.mozilla.org/security/advisories/mfsa2021-51/
|
libnss3 |
CVE-2020-25648 |
LOW |
2:3.49.1-1ubuntu1.5 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json https://access.redhat.com/security/cve/CVE-2020-25648 https://bugzilla.redhat.com/show_bug.cgi?id=1887319 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes https://linux.oracle.com/cve/CVE-2020-25648.html https://linux.oracle.com/errata/ELSA-2021-3572.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libopenexr-dev |
CVE-2021-20296 |
LOW |
2.3.0-6ubuntu0.5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20296 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854 https://bugzilla.redhat.com/show_bug.cgi?id=1939141 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://ubuntu.com/security/notices/USN-4996-1 https://ubuntu.com/security/notices/USN-4996-2 https://www.openexr.com/
|
libopenexr-dev |
CVE-2021-3598 |
LOW |
2.3.0-6ubuntu0.5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3598 https://bugzilla.redhat.com/show_bug.cgi?id=1970987 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598 https://github.com/AcademySoftwareFoundation/openexr/pull/1037 https://ubuntu.com/security/notices/USN-4996-1 https://ubuntu.com/security/notices/USN-4996-2
|
libopenexr-dev |
CVE-2021-45942 |
LOW |
2.3.0-6ubuntu0.5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45942 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942 https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022 https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 https://github.com/AcademySoftwareFoundation/openexr/pull/1209 https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
|
libopenexr24 |
CVE-2021-20296 |
LOW |
2.3.0-6ubuntu0.5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20296 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854 https://bugzilla.redhat.com/show_bug.cgi?id=1939141 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://ubuntu.com/security/notices/USN-4996-1 https://ubuntu.com/security/notices/USN-4996-2 https://www.openexr.com/
|
libopenexr24 |
CVE-2021-3598 |
LOW |
2.3.0-6ubuntu0.5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3598 https://bugzilla.redhat.com/show_bug.cgi?id=1970987 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598 https://github.com/AcademySoftwareFoundation/openexr/pull/1037 https://ubuntu.com/security/notices/USN-4996-1 https://ubuntu.com/security/notices/USN-4996-2
|
libopenexr24 |
CVE-2021-45942 |
LOW |
2.3.0-6ubuntu0.5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45942 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942 https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022 https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 https://github.com/AcademySoftwareFoundation/openexr/pull/1209 https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
|
libopenjp2-7 |
CVE-2019-6988 |
LOW |
2.3.1-1ubuntu4.20.04.1 |
|
Expand...http://www.securityfocus.com/bid/106785 https://access.redhat.com/security/cve/CVE-2019-6988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988 https://github.com/uclouvain/openjpeg/issues/1178
|
libopenjp2-7 |
CVE-2021-29338 |
LOW |
2.3.1-1ubuntu4.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-29338 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338 https://github.com/uclouvain/openjpeg/issues/1338 https://github.com/uclouvain/openjpeg/pull/1346 https://github.com/uclouvain/openjpeg/pull/1395 https://github.com/uclouvain/openjpeg/pull/1396 https://github.com/uclouvain/openjpeg/pull/1397 https://github.com/uclouvain/openjpeg/pull/1398 https://linux.oracle.com/cve/CVE-2021-29338.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
|
libopenjp2-7 |
CVE-2021-3575 |
LOW |
2.3.1-1ubuntu4.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3575 https://bugzilla.redhat.com/show_bug.cgi?id=1957616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575 https://github.com/uclouvain/openjpeg/issues/1347 https://linux.oracle.com/cve/CVE-2021-3575.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://ubuntu.com/security/CVE-2021-3575
|
libpam-systemd |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
libpam-systemd |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libpam-systemd |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libpcre16-3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre16-3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre16-3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3-dev |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3-dev |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre3-dev |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre32-3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre32-3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcre32-3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcrecpp0v5 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcrecpp0v5 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libpcrecpp0v5 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://www.pcre.org/original/changelog.txt
|
libperl5.30 |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
libpolkit-agent-1-0 |
CVE-2021-4034 |
HIGH |
0.105-26ubuntu1.1 |
0.105-26ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json https://access.redhat.com/security/cve/CVE-2021-4034 https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 https://bugzilla.redhat.com/show_bug.cgi?id=2025869 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034 https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 https://linux.oracle.com/cve/CVE-2021-4034.html https://linux.oracle.com/errata/ELSA-2022-9073.html https://nvd.nist.gov/vuln/detail/CVE-2021-4034 https://ubuntu.com/security/notices/USN-5252-1 https://ubuntu.com/security/notices/USN-5252-2 https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
|
libpolkit-agent-1-0 |
CVE-2021-4115 |
MEDIUM |
0.105-26ubuntu1.1 |
0.105-26ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4115 https://access.redhat.com/security/cve/cve-2021-4115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115 https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ https://securitylab.github.com/advisories/GHSL-2021-077-polkit/ https://ubuntu.com/security/notices/USN-5304-1
|
libpolkit-agent-1-0 |
CVE-2016-2568 |
LOW |
0.105-26ubuntu1.1 |
|
Expand...http://seclists.org/oss-sec/2016/q1/443 http://www.openwall.com/lists/oss-security/2016/02/26/3 https://access.redhat.com/security/cve/CVE-2016-2568 https://access.redhat.com/security/cve/cve-2016-2568 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062 https://bugzilla.redhat.com/show_bug.cgi?id=1300746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568 https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2568 https://ubuntu.com/security/CVE-2016-2568
|
libpolkit-gobject-1-0 |
CVE-2021-4034 |
HIGH |
0.105-26ubuntu1.1 |
0.105-26ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json https://access.redhat.com/security/cve/CVE-2021-4034 https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 https://bugzilla.redhat.com/show_bug.cgi?id=2025869 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034 https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 https://linux.oracle.com/cve/CVE-2021-4034.html https://linux.oracle.com/errata/ELSA-2022-9073.html https://nvd.nist.gov/vuln/detail/CVE-2021-4034 https://ubuntu.com/security/notices/USN-5252-1 https://ubuntu.com/security/notices/USN-5252-2 https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
|
libpolkit-gobject-1-0 |
CVE-2021-4115 |
MEDIUM |
0.105-26ubuntu1.1 |
0.105-26ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4115 https://access.redhat.com/security/cve/cve-2021-4115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115 https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ https://securitylab.github.com/advisories/GHSL-2021-077-polkit/ https://ubuntu.com/security/notices/USN-5304-1
|
libpolkit-gobject-1-0 |
CVE-2016-2568 |
LOW |
0.105-26ubuntu1.1 |
|
Expand...http://seclists.org/oss-sec/2016/q1/443 http://www.openwall.com/lists/oss-security/2016/02/26/3 https://access.redhat.com/security/cve/CVE-2016-2568 https://access.redhat.com/security/cve/cve-2016-2568 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062 https://bugzilla.redhat.com/show_bug.cgi?id=1300746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568 https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2568 https://ubuntu.com/security/CVE-2016-2568
|
libpoppler-glib8 |
CVE-2019-9543 |
LOW |
0.86.1-0ubuntu1 |
|
Expand...http://www.securityfocus.com/bid/107238 https://access.redhat.com/security/cve/CVE-2019-9543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543 https://gitlab.freedesktop.org/poppler/poppler/issues/730 https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
|
libpoppler-glib8 |
CVE-2019-9545 |
LOW |
0.86.1-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9545 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545 https://gitlab.freedesktop.org/poppler/poppler/issues/731 https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
|
libpoppler97 |
CVE-2019-9543 |
LOW |
0.86.1-0ubuntu1 |
|
Expand...http://www.securityfocus.com/bid/107238 https://access.redhat.com/security/cve/CVE-2019-9543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543 https://gitlab.freedesktop.org/poppler/poppler/issues/730 https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
|
libpoppler97 |
CVE-2019-9545 |
LOW |
0.86.1-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-9545 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545 https://gitlab.freedesktop.org/poppler/poppler/issues/731 https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
|
libpq-dev |
CVE-2021-3449 |
HIGH |
12.7-0ubuntu0.20.04.1 |
12.8-0ubuntu0.20.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://access.redhat.com/security/cve/CVE-2021-3449 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845 https://kc.mcafee.com/corporate/index?page=content&id=SB10356 https://linux.oracle.com/cve/CVE-2021-3449.html https://linux.oracle.com/errata/ELSA-2021-9151.html https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/ https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013 https://rustsec.org/advisories/RUSTSEC-2021-0055.html https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc https://security.gentoo.org/glsa/202103-03 https://security.netapp.com/advisory/ntap-20210326-0006/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd https://ubuntu.com/security/notices/USN-4891-1 https://ubuntu.com/security/notices/USN-5038-1 https://www.debian.org/security/2021/dsa-4875 https://www.openssl.org/news/secadv/20210325.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-05 https://www.tenable.com/security/tns-2021-06 https://www.tenable.com/security/tns-2021-09 https://www.tenable.com/security/tns-2021-10
|
libpq-dev |
CVE-2021-23214 |
MEDIUM |
12.7-0ubuntu0.20.04.1 |
12.9-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23214 https://bugzilla.redhat.com/show_bug.cgi?id=2022666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214 https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951 https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951 https://linux.oracle.com/cve/CVE-2021-23214.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://nvd.nist.gov/vuln/detail/CVE-2021-23214 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ https://www.postgresql.org/support/security/CVE-2021-23214/
|
libpq-dev |
CVE-2021-23222 |
MEDIUM |
12.7-0ubuntu0.20.04.1 |
12.9-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23222 https://bugzilla.redhat.com/show_bug.cgi?id=2022675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222 https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228 https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45 https://nvd.nist.gov/vuln/detail/CVE-2021-23222 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ https://www.postgresql.org/support/security/CVE-2021-23222/
|
libpq-dev |
CVE-2021-3677 |
MEDIUM |
12.7-0ubuntu0.20.04.1 |
12.8-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3677 https://bugzilla.redhat.com/show_bug.cgi?id=2001857 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677 https://linux.oracle.com/cve/CVE-2021-3677.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://nvd.nist.gov/vuln/detail/CVE-2021-3677 https://ubuntu.com/security/notices/USN-5038-1 https://www.postgresql.org/support/security/CVE-2021-3677/
|
libpq5 |
CVE-2021-3449 |
HIGH |
12.7-0ubuntu0.20.04.1 |
12.8-0ubuntu0.20.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://access.redhat.com/security/cve/CVE-2021-3449 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845 https://kc.mcafee.com/corporate/index?page=content&id=SB10356 https://linux.oracle.com/cve/CVE-2021-3449.html https://linux.oracle.com/errata/ELSA-2021-9151.html https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/ https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013 https://rustsec.org/advisories/RUSTSEC-2021-0055.html https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc https://security.gentoo.org/glsa/202103-03 https://security.netapp.com/advisory/ntap-20210326-0006/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd https://ubuntu.com/security/notices/USN-4891-1 https://ubuntu.com/security/notices/USN-5038-1 https://www.debian.org/security/2021/dsa-4875 https://www.openssl.org/news/secadv/20210325.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-05 https://www.tenable.com/security/tns-2021-06 https://www.tenable.com/security/tns-2021-09 https://www.tenable.com/security/tns-2021-10
|
libpq5 |
CVE-2021-23214 |
MEDIUM |
12.7-0ubuntu0.20.04.1 |
12.9-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23214 https://bugzilla.redhat.com/show_bug.cgi?id=2022666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214 https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951 https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951 https://linux.oracle.com/cve/CVE-2021-23214.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://nvd.nist.gov/vuln/detail/CVE-2021-23214 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ https://www.postgresql.org/support/security/CVE-2021-23214/
|
libpq5 |
CVE-2021-23222 |
MEDIUM |
12.7-0ubuntu0.20.04.1 |
12.9-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23222 https://bugzilla.redhat.com/show_bug.cgi?id=2022675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222 https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228 https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45 https://nvd.nist.gov/vuln/detail/CVE-2021-23222 https://ubuntu.com/security/notices/USN-5145-1 https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/ https://www.postgresql.org/support/security/CVE-2021-23222/
|
libpq5 |
CVE-2021-3677 |
MEDIUM |
12.7-0ubuntu0.20.04.1 |
12.8-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3677 https://bugzilla.redhat.com/show_bug.cgi?id=2001857 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677 https://linux.oracle.com/cve/CVE-2021-3677.html https://linux.oracle.com/errata/ELSA-2021-5236.html https://nvd.nist.gov/vuln/detail/CVE-2021-3677 https://ubuntu.com/security/notices/USN-5038-1 https://www.postgresql.org/support/security/CVE-2021-3677/
|
libpython3.8 |
CVE-2021-29921 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst https://github.com/python/cpython/pull/12577 https://github.com/python/cpython/pull/25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://linux.oracle.com/cve/CVE-2021-29921.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpython3.8 |
CVE-2021-3737 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2021-4160.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
libpython3.8 |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1
|
libpython3.8-minimal |
CVE-2021-29921 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst https://github.com/python/cpython/pull/12577 https://github.com/python/cpython/pull/25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://linux.oracle.com/cve/CVE-2021-29921.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpython3.8-minimal |
CVE-2021-3737 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2021-4160.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
libpython3.8-minimal |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1
|
libpython3.8-stdlib |
CVE-2021-29921 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst https://github.com/python/cpython/pull/12577 https://github.com/python/cpython/pull/25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://linux.oracle.com/cve/CVE-2021-29921.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpython3.8-stdlib |
CVE-2021-3737 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2021-4160.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
libpython3.8-stdlib |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1
|
libqt5concurrent5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5concurrent5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5concurrent5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5core5a |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5core5a |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5core5a |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5dbus5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5dbus5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5dbus5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5gui5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5gui5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5gui5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5network5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5network5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5network5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5printsupport5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5printsupport5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5printsupport5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5widgets5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5widgets5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5widgets5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libqt5xml5 |
CVE-2020-13962 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html https://access.redhat.com/security/cve/CVE-2020-13962 https://bugreports.qt.io/browse/QTBUG-83450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962 https://github.com/mumble-voip/mumble/issues/3679 https://github.com/mumble-voip/mumble/pull/4032 https://linux.oracle.com/cve/CVE-2020-13962.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/ https://nvd.nist.gov/vuln/detail/CVE-2020-13962 https://security.gentoo.org/glsa/202007-18
|
libqt5xml5 |
CVE-2022-25255 |
MEDIUM |
5.12.8+dfsg-0ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25255 https://codereview.qt-project.org/c/qt/qtbase/+/393113 https://codereview.qt-project.org/c/qt/qtbase/+/394914 https://codereview.qt-project.org/c/qt/qtbase/+/396020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255 https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
|
libqt5xml5 |
CVE-2020-17507 |
LOW |
5.12.8+dfsg-0ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html https://access.redhat.com/security/cve/CVE-2020-17507 https://codereview.qt-project.org/c/qt/qtbase/+/308436 https://codereview.qt-project.org/c/qt/qtbase/+/308495 https://codereview.qt-project.org/c/qt/qtbase/+/308496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507 https://linux.oracle.com/cve/CVE-2020-17507.html https://linux.oracle.com/errata/ELSA-2021-1756.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/ https://nvd.nist.gov/vuln/detail/CVE-2020-17507 https://security.gentoo.org/glsa/202009-04 https://ubuntu.com/security/notices/USN-5081-1
|
libroken18-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libsasl2-2 |
CVE-2022-24407 |
HIGH |
2.1.27+dfsg-2 |
2.1.27+dfsg-2ubuntu0.1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2022-24407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-9239.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ https://nvd.nist.gov/vuln/detail/CVE-2022-24407 https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsasl2-modules-db |
CVE-2022-24407 |
HIGH |
2.1.27+dfsg-2 |
2.1.27+dfsg-2ubuntu0.1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2022-24407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-9239.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ https://nvd.nist.gov/vuln/detail/CVE-2022-24407 https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsepol1 |
CVE-2021-36084 |
LOW |
3.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36084 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36085 |
LOW |
3.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36085 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36086 |
LOW |
3.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36086 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
|
libsepol1 |
CVE-2021-36087 |
LOW |
3.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36087 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
|
libsmartcols1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libsmartcols1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libsmbclient |
CVE-2021-44142 |
HIGH |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json https://access.redhat.com/security/cve/CVE-2021-44142 https://bugzilla.samba.org/show_bug.cgi?id=14914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 https://kb.cert.org/vuls/id/119678 https://linux.oracle.com/cve/CVE-2021-44142.html https://linux.oracle.com/errata/ELSA-2022-0332.html https://nvd.nist.gov/vuln/detail/CVE-2021-44142 https://ubuntu.com/security/notices/USN-5260-1 https://ubuntu.com/security/notices/USN-5260-2 https://ubuntu.com/security/notices/USN-5260-3 https://www.samba.org/samba/security/CVE-2021-44142.html https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
|
libsmbclient |
CVE-2016-2124 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2016-2124 https://bugzilla.redhat.com/show_bug.cgi?id=2019660 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124 https://linux.oracle.com/cve/CVE-2016-2124.html https://linux.oracle.com/errata/ELSA-2021-5192.html https://nvd.nist.gov/vuln/detail/CVE-2016-2124 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2016-2124.html
|
libsmbclient |
CVE-2020-25717 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25717 https://bugzilla.redhat.com/show_bug.cgi?id=2019672 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717 https://linux.oracle.com/cve/CVE-2020-25717.html https://linux.oracle.com/errata/ELSA-2021-5192.html https://nvd.nist.gov/vuln/detail/CVE-2020-25717 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25717.html
|
libsmbclient |
CVE-2020-25718 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25718 https://bugzilla.redhat.com/show_bug.cgi?id=2019726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718 https://nvd.nist.gov/vuln/detail/CVE-2020-25718 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25718.html
|
libsmbclient |
CVE-2020-25719 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25719 https://bugzilla.redhat.com/show_bug.cgi?id=2019732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719 https://linux.oracle.com/cve/CVE-2020-25719.html https://linux.oracle.com/errata/ELSA-2021-5195.html https://nvd.nist.gov/vuln/detail/CVE-2020-25719 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25719.html
|
libsmbclient |
CVE-2020-25721 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25721 https://bugzilla.redhat.com/show_bug.cgi?id=2021728 https://bugzilla.samba.org/show_bug.cgi?id=14725 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25721.html
|
libsmbclient |
CVE-2020-25722 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25722 https://bugzilla.redhat.com/show_bug.cgi?id=2019764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722 https://nvd.nist.gov/vuln/detail/CVE-2020-25722 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25722.html
|
libsmbclient |
CVE-2021-23192 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23192 https://bugzilla.redhat.com/show_bug.cgi?id=2019666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192 https://linux.oracle.com/cve/CVE-2021-23192.html https://linux.oracle.com/errata/ELSA-2021-5082.html https://nvd.nist.gov/vuln/detail/CVE-2021-23192 https://ubuntu.com/security/CVE-2021-23192 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2021-23192.html
|
libsmbclient |
CVE-2021-3738 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3738 https://bugzilla.redhat.com/show_bug.cgi?id=2021726 https://bugzilla.samba.org/show_bug.cgi?id=14468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738 https://nvd.nist.gov/vuln/detail/CVE-2021-3738 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2021-3738.html
|
libsmbclient |
CVE-2022-0336 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0336 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 https://ubuntu.com/security/notices/USN-5260-1 https://www.samba.org/samba/security/CVE-2022-0336.html
|
libsmbclient |
CVE-2021-3671 |
LOW |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libsmbclient |
CVE-2021-43566 |
LOW |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43566 https://bugzilla.samba.org/show_bug.cgi?id=13979 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566 https://nvd.nist.gov/vuln/detail/CVE-2021-43566 https://ubuntu.com/security/notices/USN-5260-1 https://www.samba.org/samba/history/ https://www.samba.org/samba/security/CVE-2021-43566.html
|
libsndfile1 |
CVE-2021-3246 |
MEDIUM |
1.0.28-7 |
1.0.28-7ubuntu0.1 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3246.json https://access.redhat.com/security/cve/CVE-2021-3246 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26803 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246 https://github.com/libsndfile/libsndfile/issues/687 https://linux.oracle.com/cve/CVE-2021-3246.html https://linux.oracle.com/errata/ELSA-2021-3295.html https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/ https://ubuntu.com/security/notices/USN-5025-1 https://ubuntu.com/security/notices/USN-5025-2 https://www.debian.org/security/2021/dsa-4947
|
libsqlite3-0 |
CVE-2020-9794 |
MEDIUM |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 https://vuldb.com/?id.155768
|
libsqlite3-0 |
CVE-2020-9849 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
libsqlite3-0 |
CVE-2020-9991 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211847 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/kb/HT211846 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
libsqlite3-0 |
CVE-2021-36690 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://nvd.nist.gov/vuln/detail/CVE-2021-36690 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
libsqlite3-dev |
CVE-2020-9794 |
MEDIUM |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 https://vuldb.com/?id.155768
|
libsqlite3-dev |
CVE-2020-9849 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
libsqlite3-dev |
CVE-2020-9991 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211847 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/kb/HT211846 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
libsqlite3-dev |
CVE-2021-36690 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://nvd.nist.gov/vuln/detail/CVE-2021-36690 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
libssh-4 |
CVE-2021-3634 |
MEDIUM |
0.9.3-2ubuntu2.1 |
0.9.3-2ubuntu2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3634 https://bugzilla.redhat.com/show_bug.cgi?id=1978810 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/ https://nvd.nist.gov/vuln/detail/CVE-2021-3634 https://security.netapp.com/advisory/ntap-20211004-0003/ https://ubuntu.com/security/notices/USN-5053-1 https://www.debian.org/security/2021/dsa-4965 https://www.oracle.com/security-alerts/cpujan2022.html
|
libssl-dev |
CVE-2021-3711 |
HIGH |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/security/cve/CVE-2021-3711 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2021-3711 https://rustsec.org/advisories/RUSTSEC-2021-0097.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5051-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
libssl-dev |
CVE-2022-0778 |
HIGH |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.12 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0778 https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9249.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.tenable.com/security/tns-2022-06
|
libssl-dev |
CVE-2021-3712 |
MEDIUM |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json https://access.redhat.com/security/cve/CVE-2021-3712 https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://nvd.nist.gov/vuln/detail/CVE-2021-3712 https://rustsec.org/advisories/RUSTSEC-2021-0098.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
libssl1.1 |
CVE-2021-3711 |
HIGH |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/security/cve/CVE-2021-3711 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2021-3711 https://rustsec.org/advisories/RUSTSEC-2021-0097.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5051-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
libssl1.1 |
CVE-2022-0778 |
HIGH |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.12 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0778 https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9249.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.tenable.com/security/tns-2022-06
|
libssl1.1 |
CVE-2021-3712 |
MEDIUM |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json https://access.redhat.com/security/cve/CVE-2021-3712 https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://nvd.nist.gov/vuln/detail/CVE-2021-3712 https://rustsec.org/advisories/RUSTSEC-2021-0098.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
libstdc++-9-dev |
CVE-2020-13844 |
MEDIUM |
9.3.0-17ubuntu1~20.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libsvn1 |
CVE-2018-11803 |
MEDIUM |
1.13.0-3 |
|
Expand...http://www.securityfocus.com/bid/106770 https://access.redhat.com/security/cve/CVE-2018-11803 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803 https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E https://security.gentoo.org/glsa/201904-08 https://subversion.apache.org/security/CVE-2018-11803-advisory.txt https://ubuntu.com/security/notices/USN-3869-1 https://usn.ubuntu.com/3869-1/
|
libsvn1 |
CVE-2020-17525 |
MEDIUM |
1.13.0-3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525 https://linux.oracle.com/cve/CVE-2020-17525.html https://linux.oracle.com/errata/ELSA-2021-0507.html https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html https://nvd.nist.gov/vuln/detail/CVE-2020-17525 https://subversion.apache.org/security/CVE-2020-17525-advisory.txt https://ubuntu.com/security/notices/USN-5322-1
|
libsystemd0 |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
libsystemd0 |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libsystemd0 |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libtiff-dev |
CVE-2020-19143 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
4.1.0+git191117-2ubuntu0.20.04.2 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851 https://access.redhat.com/security/cve/CVE-2020-19143 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143 https://gitlab.com/libtiff/libtiff/-/issues/158 https://gitlab.com/libtiff/libtiff/-/merge_requests/119 https://security.netapp.com/advisory/ntap-20211004-0005/ https://ubuntu.com/security/notices/USN-5084-1 https://www.debian.org/security/2021/dsa-4997
|
libtiff-dev |
CVE-2022-0865 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067 https://gitlab.com/libtiff/libtiff/-/issues/385 https://gitlab.com/libtiff/libtiff/-/merge_requests/306 https://nvd.nist.gov/vuln/detail/CVE-2022-0865 https://www.debian.org/security/2022/dsa-5108
|
libtiff-dev |
CVE-2022-0891 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/libtiff/libtiff/-/issues/380 https://gitlab.com/libtiff/libtiff/-/issues/382 https://nvd.nist.gov/vuln/detail/CVE-2022-0891 https://www.debian.org/security/2022/dsa-5108
|
libtiff-dev |
CVE-2018-10126 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://access.redhat.com/security/cve/CVE-2018-10126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff-dev |
CVE-2020-35522 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35522 https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://nvd.nist.gov/vuln/detail/CVE-2020-35522 https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtiff-dev |
CVE-2022-0561 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0561 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0561 https://security.netapp.com/advisory/ntap-20220318-0001/ https://www.debian.org/security/2022/dsa-5108
|
libtiff-dev |
CVE-2022-0562 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0562 https://security.netapp.com/advisory/ntap-20220318-0001/ https://www.debian.org/security/2022/dsa-5108
|
libtiff-dev |
CVE-2022-22844 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-22844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2022-22844 https://security.netapp.com/advisory/ntap-20220311-0002/ https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2020-19143 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
4.1.0+git191117-2ubuntu0.20.04.2 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851 https://access.redhat.com/security/cve/CVE-2020-19143 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143 https://gitlab.com/libtiff/libtiff/-/issues/158 https://gitlab.com/libtiff/libtiff/-/merge_requests/119 https://security.netapp.com/advisory/ntap-20211004-0005/ https://ubuntu.com/security/notices/USN-5084-1 https://www.debian.org/security/2021/dsa-4997
|
libtiff5 |
CVE-2022-0865 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067 https://gitlab.com/libtiff/libtiff/-/issues/385 https://gitlab.com/libtiff/libtiff/-/merge_requests/306 https://nvd.nist.gov/vuln/detail/CVE-2022-0865 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-0891 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/libtiff/libtiff/-/issues/380 https://gitlab.com/libtiff/libtiff/-/issues/382 https://nvd.nist.gov/vuln/detail/CVE-2022-0891 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2018-10126 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://access.redhat.com/security/cve/CVE-2018-10126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2020-35522 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35522 https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://nvd.nist.gov/vuln/detail/CVE-2020-35522 https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtiff5 |
CVE-2022-0561 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0561 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0561 https://security.netapp.com/advisory/ntap-20220318-0001/ https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-0562 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0562 https://security.netapp.com/advisory/ntap-20220318-0001/ https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-22844 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-22844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2022-22844 https://security.netapp.com/advisory/ntap-20220311-0002/ https://www.debian.org/security/2022/dsa-5108
|
libtiffxx5 |
CVE-2020-19143 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
4.1.0+git191117-2ubuntu0.20.04.2 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851 https://access.redhat.com/security/cve/CVE-2020-19143 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143 https://gitlab.com/libtiff/libtiff/-/issues/158 https://gitlab.com/libtiff/libtiff/-/merge_requests/119 https://security.netapp.com/advisory/ntap-20211004-0005/ https://ubuntu.com/security/notices/USN-5084-1 https://www.debian.org/security/2021/dsa-4997
|
libtiffxx5 |
CVE-2022-0865 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067 https://gitlab.com/libtiff/libtiff/-/issues/385 https://gitlab.com/libtiff/libtiff/-/merge_requests/306 https://nvd.nist.gov/vuln/detail/CVE-2022-0865 https://www.debian.org/security/2022/dsa-5108
|
libtiffxx5 |
CVE-2022-0891 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/libtiff/libtiff/-/issues/380 https://gitlab.com/libtiff/libtiff/-/issues/382 https://nvd.nist.gov/vuln/detail/CVE-2022-0891 https://www.debian.org/security/2022/dsa-5108
|
libtiffxx5 |
CVE-2018-10126 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://access.redhat.com/security/cve/CVE-2018-10126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiffxx5 |
CVE-2020-35522 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35522 https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://nvd.nist.gov/vuln/detail/CVE-2020-35522 https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/
|
libtiffxx5 |
CVE-2022-0561 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0561 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0561 https://security.netapp.com/advisory/ntap-20220318-0001/ https://www.debian.org/security/2022/dsa-5108
|
libtiffxx5 |
CVE-2022-0562 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0562 https://security.netapp.com/advisory/ntap-20220318-0001/ https://www.debian.org/security/2022/dsa-5108
|
libtiffxx5 |
CVE-2022-22844 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-22844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2022-22844 https://security.netapp.com/advisory/ntap-20220311-0002/ https://www.debian.org/security/2022/dsa-5108
|
libudev1 |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
libudev1 |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
libudev1 |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
libudisks2-0 |
CVE-2021-3802 |
LOW |
2.8.4-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3802 https://bugzilla.redhat.com/show_bug.cgi?id=2003649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802 https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt
|
libuuid1 |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libuuid1 |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
libwbclient0 |
CVE-2021-44142 |
HIGH |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json https://access.redhat.com/security/cve/CVE-2021-44142 https://bugzilla.samba.org/show_bug.cgi?id=14914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 https://kb.cert.org/vuls/id/119678 https://linux.oracle.com/cve/CVE-2021-44142.html https://linux.oracle.com/errata/ELSA-2022-0332.html https://nvd.nist.gov/vuln/detail/CVE-2021-44142 https://ubuntu.com/security/notices/USN-5260-1 https://ubuntu.com/security/notices/USN-5260-2 https://ubuntu.com/security/notices/USN-5260-3 https://www.samba.org/samba/security/CVE-2021-44142.html https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
|
libwbclient0 |
CVE-2016-2124 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2016-2124 https://bugzilla.redhat.com/show_bug.cgi?id=2019660 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124 https://linux.oracle.com/cve/CVE-2016-2124.html https://linux.oracle.com/errata/ELSA-2021-5192.html https://nvd.nist.gov/vuln/detail/CVE-2016-2124 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2016-2124.html
|
libwbclient0 |
CVE-2020-25717 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25717 https://bugzilla.redhat.com/show_bug.cgi?id=2019672 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717 https://linux.oracle.com/cve/CVE-2020-25717.html https://linux.oracle.com/errata/ELSA-2021-5192.html https://nvd.nist.gov/vuln/detail/CVE-2020-25717 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25717.html
|
libwbclient0 |
CVE-2020-25718 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25718 https://bugzilla.redhat.com/show_bug.cgi?id=2019726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718 https://nvd.nist.gov/vuln/detail/CVE-2020-25718 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25718.html
|
libwbclient0 |
CVE-2020-25719 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25719 https://bugzilla.redhat.com/show_bug.cgi?id=2019732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719 https://linux.oracle.com/cve/CVE-2020-25719.html https://linux.oracle.com/errata/ELSA-2021-5195.html https://nvd.nist.gov/vuln/detail/CVE-2020-25719 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25719.html
|
libwbclient0 |
CVE-2020-25721 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25721 https://bugzilla.redhat.com/show_bug.cgi?id=2021728 https://bugzilla.samba.org/show_bug.cgi?id=14725 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25721.html
|
libwbclient0 |
CVE-2020-25722 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25722 https://bugzilla.redhat.com/show_bug.cgi?id=2019764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722 https://nvd.nist.gov/vuln/detail/CVE-2020-25722 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25722.html
|
libwbclient0 |
CVE-2021-23192 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23192 https://bugzilla.redhat.com/show_bug.cgi?id=2019666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192 https://linux.oracle.com/cve/CVE-2021-23192.html https://linux.oracle.com/errata/ELSA-2021-5082.html https://nvd.nist.gov/vuln/detail/CVE-2021-23192 https://ubuntu.com/security/CVE-2021-23192 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2021-23192.html
|
libwbclient0 |
CVE-2021-3738 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3738 https://bugzilla.redhat.com/show_bug.cgi?id=2021726 https://bugzilla.samba.org/show_bug.cgi?id=14468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738 https://nvd.nist.gov/vuln/detail/CVE-2021-3738 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2021-3738.html
|
libwbclient0 |
CVE-2022-0336 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0336 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 https://ubuntu.com/security/notices/USN-5260-1 https://www.samba.org/samba/security/CVE-2022-0336.html
|
libwbclient0 |
CVE-2021-3671 |
LOW |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libwbclient0 |
CVE-2021-43566 |
LOW |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43566 https://bugzilla.samba.org/show_bug.cgi?id=13979 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566 https://nvd.nist.gov/vuln/detail/CVE-2021-43566 https://ubuntu.com/security/notices/USN-5260-1 https://www.samba.org/samba/history/ https://www.samba.org/samba/security/CVE-2021-43566.html
|
libwind0-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libxml-twig-perl |
CVE-2016-9180 |
LOW |
1:3.50-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html http://www.openwall.com/lists/oss-security/2016/11/02/1 http://www.openwall.com/lists/oss-security/2016/11/04/2 http://www.securityfocus.com/bid/94219 https://access.redhat.com/security/cve/CVE-2016-9180 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180
|
libxml2 |
CVE-2022-23308 |
MEDIUM |
2.9.10+dfsg-5ubuntu0.20.04.1 |
2.9.10+dfsg-5ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308 https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS https://linux.oracle.com/cve/CVE-2022-23308.html https://linux.oracle.com/errata/ELSA-2022-0899.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/ https://nvd.nist.gov/vuln/detail/CVE-2022-23308 https://ubuntu.com/security/notices/USN-5324-1
|
libxslt1.1 |
CVE-2015-9019 |
LOW |
1.1.34-4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9019 https://bugzilla.gnome.org/show_bug.cgi?id=758400 https://bugzilla.suse.com/show_bug.cgi?id=934119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
|
libzmq3-dev |
CVE-2020-15166 |
MEDIUM |
4.3.2-2ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-15166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166 https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09 https://github.com/zeromq/libzmq/pull/3913 https://github.com/zeromq/libzmq/pull/3973 https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/ https://security.gentoo.org/glsa/202009-12 https://www.openwall.com/lists/oss-security/2020/09/07/3
|
libzmq3-dev |
CVE-2021-20235 |
MEDIUM |
4.3.2-2ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20235 https://bugzilla.redhat.com/show_bug.cgi?id=1921983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235 https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6
|
libzmq3-dev |
CVE-2021-20236 |
MEDIUM |
4.3.2-2ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20236 https://bugzilla.redhat.com/show_bug.cgi?id=1921976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236 https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8 https://nvd.nist.gov/vuln/detail/CVE-2021-20236
|
libzmq5 |
CVE-2020-15166 |
MEDIUM |
4.3.2-2ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-15166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166 https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09 https://github.com/zeromq/libzmq/pull/3913 https://github.com/zeromq/libzmq/pull/3973 https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/ https://security.gentoo.org/glsa/202009-12 https://www.openwall.com/lists/oss-security/2020/09/07/3
|
libzmq5 |
CVE-2021-20235 |
MEDIUM |
4.3.2-2ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20235 https://bugzilla.redhat.com/show_bug.cgi?id=1921983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235 https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6
|
libzmq5 |
CVE-2021-20236 |
MEDIUM |
4.3.2-2ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20236 https://bugzilla.redhat.com/show_bug.cgi?id=1921976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236 https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8 https://nvd.nist.gov/vuln/detail/CVE-2021-20236
|
linux-libc-dev |
CVE-2021-33909 |
HIGH |
5.4.0-77.86 |
5.4.0-80.90 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html http://www.openwall.com/lists/oss-security/2021/07/22/7 http://www.openwall.com/lists/oss-security/2021/08/25/10 http://www.openwall.com/lists/oss-security/2021/09/17/2 http://www.openwall.com/lists/oss-security/2021/09/17/4 http://www.openwall.com/lists/oss-security/2021/09/21/1 https://access.redhat.com/security/cve/CVE-2021-33909 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b https://linux.oracle.com/cve/CVE-2021-33909.html https://linux.oracle.com/errata/ELSA-2021-9410.html https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/ https://nvd.nist.gov/vuln/detail/CVE-2021-33909 https://security.netapp.com/advisory/ntap-20210819-0004/ https://ubuntu.com/security/notices/USN-5014-1 https://ubuntu.com/security/notices/USN-5015-1 https://ubuntu.com/security/notices/USN-5016-1 https://ubuntu.com/security/notices/USN-5017-1 https://ubuntu.com/security/notices/USN-5018-1 https://www.debian.org/security/2021/dsa-4941 https://www.openwall.com/lists/oss-security/2021/07/20/1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
|
linux-libc-dev |
CVE-2021-3653 |
HIGH |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html https://access.redhat.com/security/cve/CVE-2021-3653 https://bugzilla.redhat.com/show_bug.cgi?id=1983686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653 https://github.com/torvalds/linux/commit/3d6368ef580a https://linux.oracle.com/cve/CVE-2021-3653.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-3653 https://ubuntu.com/security/notices/USN-5062-1 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5072-1 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5082-1 https://www.openwall.com/lists/oss-security/2021/08/16/1
|
linux-libc-dev |
CVE-2021-3656 |
HIGH |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3656 https://bugzilla.redhat.com/show_bug.cgi?id=1983988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656 https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc https://github.com/torvalds/linux/commit/89c8a4984fc9 https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc https://linux.oracle.com/cve/CVE-2021-3656.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://nvd.nist.gov/vuln/detail/CVE-2021-3656 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5072-1 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5082-1 https://www.openwall.com/lists/oss-security/2021/08/16/1
|
linux-libc-dev |
CVE-2021-4002 |
HIGH |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4002 https://bugzilla.redhat.com/show_bug.cgi?id=2025726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002 https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-4002 https://ubuntu.com/security/notices/USN-5206-1 https://ubuntu.com/security/notices/USN-5207-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5211-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/11/25/1
|
linux-libc-dev |
CVE-2022-0001 |
HIGH |
5.4.0-77.86 |
5.4.0-104.118 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2 https://access.redhat.com/security/cve/CVE-2022-0001 https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html https://ubuntu.com/security/notices/USN-5317-1 https://ubuntu.com/security/notices/USN-5318-1 https://ubuntu.com/security/notices/USN-5319-1 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html https://www.vusec.net/projects/bhi-spectre-bhb/
|
linux-libc-dev |
CVE-2022-0002 |
HIGH |
5.4.0-77.86 |
5.4.0-104.118 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2 https://access.redhat.com/security/cve/CVE-2022-0002 https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html https://ubuntu.com/security/notices/USN-5317-1 https://ubuntu.com/security/notices/USN-5318-1 https://ubuntu.com/security/notices/USN-5319-1 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html https://www.vusec.net/projects/bhi-spectre-bhb/
|
linux-libc-dev |
CVE-2022-0185 |
HIGH |
5.4.0-77.86 |
5.4.0-96.109 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json https://access.redhat.com/security/cve/CVE-2022-0185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756 https://github.com/Crusaders-of-Rust/CVE-2022-0185 https://linux.oracle.com/cve/CVE-2022-0185.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://nvd.nist.gov/vuln/detail/CVE-2022-0185 https://security.netapp.com/advisory/ntap-20220225-0003/ https://ubuntu.com/security/notices/USN-5240-1 https://www.openwall.com/lists/oss-security/2022/01/18/7 https://www.willsroot.io/2022/01/cve-2022-0185.html
|
linux-libc-dev |
CVE-2022-0492 |
HIGH |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json https://access.redhat.com/security/cve/CVE-2022-0492 https://bugzilla.redhat.com/show_bug.cgi?id=2051505 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af https://linux.oracle.com/cve/CVE-2022-0492.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2022-0492 https://ubuntu.com/security/notices/USN-5302-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5339-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2022/dsa-5095 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2022/02/04/1
|
linux-libc-dev |
CVE-2022-23960 |
HIGH |
5.4.0-77.86 |
5.4.0-104.118 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2 https://access.redhat.com/security/cve/CVE-2022-23960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960 https://developer.arm.com/documentation/ka004995/latest/ https://developer.arm.com/support/arm-security-updates https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb https://linux.oracle.com/cve/CVE-2022-23960.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://ubuntu.com/security/notices/USN-5317-1 https://ubuntu.com/security/notices/USN-5318-1 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI https://www.vusec.net/projects/bhi-spectre-bhb/
|
linux-libc-dev |
CVE-2022-25636 |
HIGH |
5.4.0-77.86 |
5.4.0-104.118 |
Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html http://www.openwall.com/lists/oss-security/2022/02/22/1 https://access.redhat.com/security/cve/CVE-2022-25636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636 https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6 https://github.com/Bonfee/CVE-2022-25636 https://linux.oracle.com/cve/CVE-2022-25636.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ https://security.netapp.com/advisory/ntap-20220325-0002/ https://ubuntu.com/security/notices/USN-5317-1 https://ubuntu.com/security/notices/USN-5318-1 https://www.debian.org/security/2022/dsa-5095 https://www.openwall.com/lists/oss-security/2022/02/21/2
|
linux-libc-dev |
CVE-2013-7445 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-7445 https://bugzilla.kernel.org/show_bug.cgi?id=60533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445 https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
|
linux-libc-dev |
CVE-2015-8553 |
MEDIUM |
5.4.0-77.86 |
|
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention) http://xenbits.xen.org/xsa/advisory-120.html https://access.redhat.com/security/cve/CVE-2015-8553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553 https://seclists.org/bugtraq/2019/Aug/18 https://www.debian.org/security/2019/dsa-4497
|
linux-libc-dev |
CVE-2016-8660 |
MEDIUM |
5.4.0-77.86 |
|
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8 http://www.securityfocus.com/bid/93558 https://access.redhat.com/security/cve/CVE-2016-8660 https://bugzilla.redhat.com/show_bug.cgi?id=1384851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660 https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/ https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2 https://marc.info/?l=linux-xfs&m=149498118228320&w=2
|
linux-libc-dev |
CVE-2018-17977 |
MEDIUM |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/105539 https://access.redhat.com/security/cve/CVE-2018-17977 https://bugzilla.suse.com/show_bug.cgi?id=1111609 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977 https://www.openwall.com/lists/oss-security/2018/10/05/5
|
linux-libc-dev |
CVE-2020-12362 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-12362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362 https://linux.oracle.com/cve/CVE-2020-12362.html https://linux.oracle.com/errata/ELSA-2021-9434.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
linux-libc-dev |
CVE-2020-24504 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-24504 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504 https://linux.oracle.com/cve/CVE-2020-24504.html https://linux.oracle.com/errata/ELSA-2021-4356.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
linux-libc-dev |
CVE-2020-26541 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2020-26541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541 https://linux.oracle.com/cve/CVE-2020-26541.html https://linux.oracle.com/errata/ELSA-2021-2570.html https://lkml.org/lkml/2020/9/15/1871 https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/ https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/ https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/ https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/ https://nvd.nist.gov/vuln/detail/CVE-2020-26541 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5210-1
|
linux-libc-dev |
CVE-2020-26555 |
MEDIUM |
5.4.0-77.86 |
5.4.0-80.90 |
Expand...https://access.redhat.com/security/cve/CVE-2020-26555 https://bugzilla.redhat.com/show_bug.cgi?id=1918601 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555 https://kb.cert.org/vuls/id/799380 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/ https://ubuntu.com/security/notices/USN-5343-1 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/ https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
|
linux-libc-dev |
CVE-2020-26558 |
MEDIUM |
5.4.0-77.86 |
5.4.0-80.90 |
Expand...https://access.redhat.com/security/cve/CVE-2020-26558 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558 https://kb.cert.org/vuls/id/799380 https://linux.oracle.com/cve/CVE-2020-26558.html https://linux.oracle.com/errata/ELSA-2021-4432.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/ https://ubuntu.com/security/notices/USN-4989-1 https://ubuntu.com/security/notices/USN-4989-2 https://ubuntu.com/security/notices/USN-5017-1 https://ubuntu.com/security/notices/USN-5018-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/ https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
|
linux-libc-dev |
CVE-2020-27835 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-27835 https://bugzilla.redhat.com/show_bug.cgi?id=1901709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835 https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79 https://linux.oracle.com/cve/CVE-2020-27835.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://ubuntu.com/security/notices/USN-4751-1
|
linux-libc-dev |
CVE-2020-36310 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36310 https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310 https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e https://linux.oracle.com/cve/CVE-2020-36310.html https://linux.oracle.com/errata/ELSA-2021-9307.html https://www.debian.org/security/2022/dsa-5095
|
linux-libc-dev |
CVE-2020-36311 |
MEDIUM |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...https://access.redhat.com/security/cve/CVE-2020-36311 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311 https://git.kernel.org/linus/7be74942f184fdfba34ddd19a0d995deb34d4a03 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03 https://linux.oracle.com/cve/CVE-2020-36311.html https://linux.oracle.com/errata/ELSA-2021-9451.html https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5120-1
|
linux-libc-dev |
CVE-2020-36385 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2020-36385 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385 https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1 https://linux.oracle.com/cve/CVE-2020-36385.html https://linux.oracle.com/errata/ELSA-2021-4777.html https://security.netapp.com/advisory/ntap-20210720-0004/ https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2 https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2020-3702 |
MEDIUM |
5.4.0-77.86 |
5.4.0-89.100 |
Expand...https://access.redhat.com/security/cve/CVE-2020-3702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702 https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/ https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 https://www.debian.org/security/2021/dsa-4978 https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
linux-libc-dev |
CVE-2021-0129 |
MEDIUM |
5.4.0-77.86 |
5.4.0-80.90 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json https://access.redhat.com/security/cve/CVE-2021-0129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129 https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f https://linux.oracle.com/cve/CVE-2021-0129.html https://linux.oracle.com/errata/ELSA-2022-9088.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html https://security.netapp.com/advisory/ntap-20210716-0002/ https://ubuntu.com/security/notices/USN-5017-1 https://ubuntu.com/security/notices/USN-5018-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4951 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
|
linux-libc-dev |
CVE-2021-0920 |
MEDIUM |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/CVE-2021-0920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920 https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca https://linux.oracle.com/cve/CVE-2021-0920.html https://linux.oracle.com/errata/ELSA-2022-9014.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://source.android.com/security/bulletin/2021-11-01
|
linux-libc-dev |
CVE-2021-20320 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20320 https://bugzilla.redhat.com/show_bug.cgi?id=2010090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320 https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-20320
|
linux-libc-dev |
CVE-2021-20321 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20321 https://bugzilla.redhat.com/show_bug.cgi?id=2013242 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321 https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5) https://linux.oracle.com/cve/CVE-2021-20321.html https://linux.oracle.com/errata/ELSA-2022-9088.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-20321 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-20322 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20322 https://bugzilla.redhat.com/show_bug.cgi?id=2014230 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-20322 https://security.netapp.com/advisory/ntap-20220303-0002/ https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-22543 |
MEDIUM |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/26/1 https://access.redhat.com/security/cve/CVE-2021-22543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543 https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584 https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97 https://linux.oracle.com/cve/CVE-2021-22543.html https://linux.oracle.com/errata/ELSA-2021-9453.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/ https://security.netapp.com/advisory/ntap-20210708-0002/ https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5071-3 https://ubuntu.com/security/notices/USN-5094-1 https://ubuntu.com/security/notices/USN-5094-2 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5120-1 https://www.openwall.com/lists/oss-security/2021/05/26/3 https://www.openwall.com/lists/oss-security/2021/05/26/4 https://www.openwall.com/lists/oss-security/2021/05/26/5
|
linux-libc-dev |
CVE-2021-22600 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22600 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-22600 https://ubuntu.com/security/notices/USN-5266-1 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5298-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-26932 |
MEDIUM |
5.4.0-77.86 |
|
Expand...http://xenbits.xen.org/xsa/advisory-361.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932 https://linux.oracle.com/cve/CVE-2021-26932.html https://linux.oracle.com/errata/ELSA-2021-9136.html https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ https://nvd.nist.gov/vuln/detail/CVE-2021-26932 https://security.netapp.com/advisory/ntap-20210326-0001/ https://www.openwall.com/lists/oss-security/2021/02/16/3 https://xenbits.xen.org/xsa/advisory-361.html
|
linux-libc-dev |
CVE-2021-28714 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-28714 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-392.html https://xenbits.xenproject.org/xsa/advisory-392.txt
|
linux-libc-dev |
CVE-2021-28715 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-28715 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-392.html https://xenbits.xenproject.org/xsa/advisory-392.txt
|
linux-libc-dev |
CVE-2021-33098 |
MEDIUM |
5.4.0-77.86 |
5.4.0-80.90 |
Expand...https://access.redhat.com/security/cve/CVE-2021-33098 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098 https://security.netapp.com/advisory/ntap-20211210-0005/ https://ubuntu.com/security/notices/USN-5343-1 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
|
linux-libc-dev |
CVE-2021-33624 |
MEDIUM |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/21/1 https://access.redhat.com/security/cve/CVE-2021-33624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://nvd.nist.gov/vuln/detail/CVE-2021-33624 https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5091-2 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5115-1 https://www.openwall.com/lists/oss-security/2021/06/21/1 https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
|
linux-libc-dev |
CVE-2021-34556 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/01/3 https://access.redhat.com/security/cve/CVE-2021-34556 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/ https://nvd.nist.gov/vuln/detail/CVE-2021-34556 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/08/01/3
|
linux-libc-dev |
CVE-2021-35477 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-35477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/ https://nvd.nist.gov/vuln/detail/CVE-2021-35477 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/08/01/3
|
linux-libc-dev |
CVE-2021-3564 |
MEDIUM |
5.4.0-77.86 |
5.4.0-81.91 |
Expand...http://www.openwall.com/lists/oss-security/2021/05/25/1 http://www.openwall.com/lists/oss-security/2021/06/01/2 https://access.redhat.com/security/cve/CVE-2021-3564 https://bugzilla.redhat.com/show_bug.cgi?id=1964139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564 https://linux.oracle.com/cve/CVE-2021-3564.html https://linux.oracle.com/errata/ELSA-2022-0620.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-3564 https://ubuntu.com/security/notices/USN-5015-1 https://ubuntu.com/security/notices/USN-5044-1 https://ubuntu.com/security/notices/USN-5045-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.openwall.com/lists/oss-security/2021/05/25/1
|
linux-libc-dev |
CVE-2021-3573 |
MEDIUM |
5.4.0-77.86 |
5.4.0-81.91 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json https://access.redhat.com/security/cve/CVE-2021-3573 https://bugzilla.redhat.com/show_bug.cgi?id=1966578 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573 https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52 https://linux.oracle.com/cve/CVE-2021-3573.html https://linux.oracle.com/errata/ELSA-2022-0620.html https://nvd.nist.gov/vuln/detail/CVE-2021-3573 https://ubuntu.com/security/notices/USN-5015-1 https://ubuntu.com/security/notices/USN-5044-1 https://ubuntu.com/security/notices/USN-5045-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.openwall.com/lists/oss-security/2021/06/08/2
|
linux-libc-dev |
CVE-2021-3612 |
MEDIUM |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3612 https://bugzilla.redhat.com/show_bug.cgi?id=1974079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612 https://linux.oracle.com/cve/CVE-2021-3612.html https://linux.oracle.com/errata/ELSA-2021-9453.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/ https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/ https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u https://security.netapp.com/advisory/ntap-20210805-0005/ https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5071-3 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5073-3 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2021-3640 |
MEDIUM |
5.4.0-77.86 |
5.4.0-97.110 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3640 https://bugzilla.redhat.com/show_bug.cgi?id=1980646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640 https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951 https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951 https://linux.oracle.com/cve/CVE-2021-3640.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lkml.org/lkml/2021/8/28/238 https://nvd.nist.gov/vuln/detail/CVE-2021-3640 https://ubuntu.com/security/CVE-2021-3640 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5267-1 https://ubuntu.com/security/notices/USN-5267-3 https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/07/22/1 https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/ https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/ https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
|
linux-libc-dev |
CVE-2021-3655 |
MEDIUM |
5.4.0-77.86 |
5.4.0-91.102 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3655 https://bugzilla.redhat.com/show_bug.cgi?id=1984024 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f https://linux.oracle.com/cve/CVE-2021-3655.html https://linux.oracle.com/errata/ELSA-2021-9488.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/ https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-3655 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1 https://ubuntu.com/security/notices/USN-5163-1
|
linux-libc-dev |
CVE-2021-3732 |
MEDIUM |
5.4.0-77.86 |
5.4.0-89.100 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3732 https://bugzilla.redhat.com/show_bug.cgi?id=1995249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732 https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 https://linux.oracle.com/cve/CVE-2021-3732.html https://linux.oracle.com/errata/ELSA-2021-9577.html https://nvd.nist.gov/vuln/detail/CVE-2021-3732 https://ubuntu.com/security/CVE-2021-3732 https://ubuntu.com/security/notices/USN-5094-1 https://ubuntu.com/security/notices/USN-5094-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2
|
linux-libc-dev |
CVE-2021-3743 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3743 https://bugzilla.redhat.com/show_bug.cgi?id=1997961 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=194ccc88297ae78d0803adad83c6dcc369787c9e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9d24c9429e2159d1e279dc3a83191ccb4daf1d https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117 https://linux.oracle.com/cve/CVE-2021-3743.html https://linux.oracle.com/errata/ELSA-2021-9475.html https://lists.openwall.net/netdev/2021/08/17/124 https://nvd.nist.gov/vuln/detail/CVE-2021-3743 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5117-1 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/08/27/2
|
linux-libc-dev |
CVE-2021-3752 |
MEDIUM |
5.4.0-77.86 |
5.4.0-97.110 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3752 https://bugzilla.redhat.com/show_bug.cgi?id=1999544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752 https://linux.oracle.com/cve/CVE-2021-3752.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-3752 https://security.netapp.com/advisory/ntap-20220318-0009/ https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5267-1 https://ubuntu.com/security/notices/USN-5267-3 https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/09/15/4
|
linux-libc-dev |
CVE-2021-3753 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3753 https://bugzilla.redhat.com/show_bug.cgi?id=1999589 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753 https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7 https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7 https://linux.oracle.com/cve/CVE-2021-3753.html https://linux.oracle.com/errata/ELSA-2022-9088.html https://nvd.nist.gov/vuln/detail/CVE-2021-3753 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5117-1 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/09/01/4
|
linux-libc-dev |
CVE-2021-37576 |
MEDIUM |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2 https://access.redhat.com/security/cve/CVE-2021-37576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576 https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a https://linux.oracle.com/cve/CVE-2021-37576.html https://linux.oracle.com/errata/ELSA-2021-3801.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/ https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u https://nvd.nist.gov/vuln/detail/CVE-2021-37576 https://security.netapp.com/advisory/ntap-20210917-0005/ https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5094-1 https://www.debian.org/security/2021/dsa-4978 https://www.openwall.com/lists/oss-security/2021/07/26/1
|
linux-libc-dev |
CVE-2021-3759 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3759 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759 https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5117-1 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5135-1 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2
|
linux-libc-dev |
CVE-2021-3760 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3760 https://bugzilla.redhat.com/show_bug.cgi?id=2000585 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://security.netapp.com/advisory/ntap-20220318-0007/ https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/10/26/2
|
linux-libc-dev |
CVE-2021-3764 |
MEDIUM |
5.4.0-77.86 |
5.4.0-91.102 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5140-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1 https://ubuntu.com/security/notices/USN-5163-1 https://ubuntu.com/security/notices/USN-5164-1
|
linux-libc-dev |
CVE-2021-38160 |
MEDIUM |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/CVE-2021-38160 https://access.redhat.com/security/cve/cve-2021-38160 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160 https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46 https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46 https://linux.oracle.com/cve/CVE-2021-38160.html https://linux.oracle.com/errata/ELSA-2021-9488.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-38160 https://security.netapp.com/advisory/ntap-20210902-0010/ https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5073-3 https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5091-2 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4978
|
linux-libc-dev |
CVE-2021-38198 |
MEDIUM |
5.4.0-77.86 |
5.4.0-89.100 |
Expand...https://access.redhat.com/security/cve/CVE-2021-38198 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198 https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7 https://linux.oracle.com/cve/CVE-2021-38198.html https://linux.oracle.com/errata/ELSA-2021-9475.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-38198 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2021-38199 |
MEDIUM |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/CVE-2021-38199 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-38199 https://security.netapp.com/advisory/ntap-20210902-0010/ https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5091-2 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5136-1 https://www.debian.org/security/2021/dsa-4978
|
linux-libc-dev |
CVE-2021-38207 |
MEDIUM |
5.4.0-77.86 |
5.4.0-81.91 |
Expand...https://access.redhat.com/security/cve/CVE-2021-38207 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207 https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d https://nvd.nist.gov/vuln/detail/CVE-2021-38207 https://security.netapp.com/advisory/ntap-20210902-0007/ https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5120-1
|
linux-libc-dev |
CVE-2021-38208 |
MEDIUM |
5.4.0-77.86 |
5.4.0-81.91 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/17/1 http://www.openwall.com/lists/oss-security/2021/08/17/2 http://www.openwall.com/lists/oss-security/2021/08/24/2 https://access.redhat.com/security/cve/CVE-2021-38208 https://bugzilla.redhat.com/show_bug.cgi?id=1992810 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208 https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba https://nvd.nist.gov/vuln/detail/CVE-2021-38208 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2021-3864 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864 https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/ https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com https://www.openwall.com/lists/oss-security/2021/10/20/2
|
linux-libc-dev |
CVE-2021-39633 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633 https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14) https://source.android.com/security/bulletin/2022-01-01
|
linux-libc-dev |
CVE-2021-39685 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/security/cve/CVE-2021-39685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a https://github.com/szymonh/inspector-gadget https://gitlab.com/postmarketOS/pmaports/-/issues/1346 https://linux.oracle.com/cve/CVE-2021-39685.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://source.android.com/security/bulletin/2022-03-01 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://www.openwall.com/lists/oss-security/2021/12/15/4
|
linux-libc-dev |
CVE-2021-4001 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4001 https://bugzilla.redhat.com/show_bug.cgi?id=2025645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001 https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53 https://nvd.nist.gov/vuln/detail/CVE-2021-4001 https://ubuntu.com/security/notices/USN-5207-1 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5278-1
|
linux-libc-dev |
CVE-2021-4037 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
|
linux-libc-dev |
CVE-2021-40490 |
MEDIUM |
5.4.0-77.86 |
5.4.0-89.100 |
Expand...https://access.redhat.com/security/cve/CVE-2021-40490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490 https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa https://linux.oracle.com/cve/CVE-2021-40490.html https://linux.oracle.com/errata/ELSA-2021-9488.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/ https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-40490 https://security.netapp.com/advisory/ntap-20211004-0001/ https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4978
|
linux-libc-dev |
CVE-2021-4083 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4083 https://bugzilla.redhat.com/show_bug.cgi?id=2029923 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083 https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-4083 https://security.netapp.com/advisory/ntap-20220217-0005/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-4135 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135 https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6) https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1
|
linux-libc-dev |
CVE-2021-4148 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4148 https://bugzilla.redhat.com/show_bug.cgi?id=2026487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148 https://lkml.org/lkml/2021/9/12/323 https://lkml.org/lkml/2021/9/17/1037 https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/ https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/ https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
|
linux-libc-dev |
CVE-2021-4149 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4149 https://bugzilla.redhat.com/show_bug.cgi?id=2026485 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149 https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6) https://lkml.org/lkml/2021/10/18/885 https://lkml.org/lkml/2021/9/13/2565
|
linux-libc-dev |
CVE-2021-4150 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4150 https://bugzilla.redhat.com/show_bug.cgi?id=2025938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150 https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7) https://lkml.org/lkml/2021/10/18/485 https://lkml.org/lkml/2021/9/6/781
|
linux-libc-dev |
CVE-2021-4154 |
MEDIUM |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4154 https://bugzilla.redhat.com/show_bug.cgi?id=2034514 https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154 https://git.kernel.org/linus/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b (5.14-rc2) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b https://linux.oracle.com/cve/CVE-2021-4154.html https://linux.oracle.com/errata/ELSA-2022-0825.html https://nvd.nist.gov/vuln/detail/CVE-2021-4154 https://security.netapp.com/advisory/ntap-20220225-0004/
|
linux-libc-dev |
CVE-2021-4155 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json https://access.redhat.com/security/cve/CVE-2021-4155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155 https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79 https://linux.oracle.com/cve/CVE-2021-4155.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://www.openwall.com/lists/oss-security/2022/01/10/1
|
linux-libc-dev |
CVE-2021-4157 |
MEDIUM |
5.4.0-77.86 |
5.4.0-80.90 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4157 https://bugzilla.redhat.com/show_bug.cgi?id=2034342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157 https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1) https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/
|
linux-libc-dev |
CVE-2021-4159 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4159 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
|
linux-libc-dev |
CVE-2021-4197 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4197 https://bugzilla.redhat.com/show_bug.cgi?id=2035652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197 https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1
|
linux-libc-dev |
CVE-2021-4202 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4202 https://bugzilla.redhat.com/show_bug.cgi?id=2036682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1
|
linux-libc-dev |
CVE-2021-4203 |
MEDIUM |
5.4.0-77.86 |
5.4.0-91.102 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4203 https://bugs.chromium.org/p/project-zero/issues/detail?id=2230 https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1 https://bugzilla.redhat.com/show_bug.cgi?id=2036934 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203 https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4) https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814 https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
|
linux-libc-dev |
CVE-2021-4218 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
|
linux-libc-dev |
CVE-2021-42252 |
MEDIUM |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42252 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252 https://git.kernel.org/linus/b49a0e69a7b1a68c8d3f64097d06dabb770fec96 (5.15-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96 https://nvd.nist.gov/vuln/detail/CVE-2021-42252 https://security.netapp.com/advisory/ntap-20211112-0006/ https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1
|
linux-libc-dev |
CVE-2021-42739 |
MEDIUM |
5.4.0-77.86 |
5.4.0-97.110 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42739 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e https://linux.oracle.com/cve/CVE-2021-42739.html https://linux.oracle.com/errata/ELSA-2022-0063.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/ https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/ https://nvd.nist.gov/vuln/detail/CVE-2021-42739 https://seclists.org/oss-sec/2021/q2/46 https://security.netapp.com/advisory/ntap-20211118-0001/ https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5207-1 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5266-1 https://ubuntu.com/security/notices/USN-5267-1 https://ubuntu.com/security/notices/USN-5267-3 https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-43056 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1 https://access.redhat.com/security/cve/CVE-2021-43056 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056 https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/ https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1
|
linux-libc-dev |
CVE-2021-43975 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-43975 https://security.netapp.com/advisory/ntap-20211210-0001/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5337-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-44733 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-44733 https://bugzilla.redhat.com/show_bug.cgi?id=2030747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c https://github.com/pjlantz/optee-qemu/blob/main/README.md https://linux.oracle.com/cve/CVE-2021-44733.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/ https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-44733 https://security.netapp.com/advisory/ntap-20220114-0003/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5339-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-44879 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-44879 https://bugzilla.kernel.org/show_bug.cgi?id=215231 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f https://lkml.org/lkml/2022/1/24/4067 https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-44879 https://ubuntu.com/security/notices/USN-5302-1 https://www.openwall.com/lists/oss-security/2022/02/12/1
|
linux-libc-dev |
CVE-2021-45095 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-45095 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0 https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-45095 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5339-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-45469 |
MEDIUM |
5.4.0-77.86 |
|
Expand...http://www.openwall.com/lists/oss-security/2021/12/25/1 https://access.redhat.com/security/cve/CVE-2021-45469 https://bugzilla.kernel.org/show_bug.cgi?id=215235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469 https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-45469 https://security.netapp.com/advisory/ntap-20220114-0003/ https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-45480 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-45480 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480 https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0 https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-45480 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-45485 |
MEDIUM |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...https://access.redhat.com/security/cve/CVE-2021-45485 https://arxiv.org/pdf/2112.09604.pdf https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485 https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99 https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/ https://nvd.nist.gov/vuln/detail/CVE-2021-45485 https://security.netapp.com/advisory/ntap-20220121-0001/ https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2022-0322 |
MEDIUM |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0322 https://bugzilla.redhat.com/show_bug.cgi?id=2042822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322 https://git.kernel.org/linus/a2d859e3fc97e79d907761550dbc03ff1b36479c (5.15-rc6) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
|
linux-libc-dev |
CVE-2022-0330 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json https://access.redhat.com/security/cve/CVE-2022-0330 https://bugzilla.redhat.com/show_bug.cgi?id=2042404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330 https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c https://linux.oracle.com/cve/CVE-2022-0330.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://www.openwall.com/lists/oss-security/2022/01/25/12
|
linux-libc-dev |
CVE-2022-0382 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0382 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382 https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523 https://nvd.nist.gov/vuln/detail/CVE-2022-0382 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1
|
linux-libc-dev |
CVE-2022-0400 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0400 https://bugzilla.redhat.com/show_bug.cgi?id=2040604 https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public) https://bugzilla.redhat.com/show_bug.cgi?id=2044575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
|
linux-libc-dev |
CVE-2022-0435 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json https://access.redhat.com/security/cve/CVE-2022-0435 https://bugzilla.redhat.com/show_bug.cgi?id=2048738 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435 https://linux.oracle.com/cve/CVE-2022-0435.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://ubuntu.com/security/notices/USN-5302-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5339-1 https://www.openwall.com/lists/oss-security/2022/02/10/1
|
linux-libc-dev |
CVE-2022-0480 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0480 https://bugzilla.redhat.com/show_bug.cgi?id=2049700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480 https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1) https://github.com/kata-containers/kata-containers/issues/3373 https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
|
linux-libc-dev |
CVE-2022-0487 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0487 https://bugzilla.redhat.com/show_bug.cgi?id=2044561 https://bugzilla.suse.com/show_bug.cgi?id=1194516 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/ https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2022-0487 https://www.debian.org/security/2022/dsa-5095 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2022-0500 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0500 https://bugzilla.redhat.com/show_bug.cgi?id=2044578 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
|
linux-libc-dev |
CVE-2022-0516 |
MEDIUM |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0516 https://bugzilla.redhat.com/show_bug.cgi?id=2050237 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55 https://linux.oracle.com/cve/CVE-2022-0516.html https://linux.oracle.com/errata/ELSA-2022-0825.html https://nvd.nist.gov/vuln/detail/CVE-2022-0516 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5092 https://www.openwall.com/lists/oss-security/2022/02/11/2
|
linux-libc-dev |
CVE-2022-0850 |
MEDIUM |
5.4.0-77.86 |
5.4.0-84.94 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0850 https://bugzilla.redhat.com/show_bug.cgi?id=2060606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
|
linux-libc-dev |
CVE-2022-0998 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0998 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998 https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1) https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
|
linux-libc-dev |
CVE-2022-22942 |
MEDIUM |
5.4.0-77.86 |
5.4.0-100.113 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942 https://linux.oracle.com/cve/CVE-2022-22942.html https://linux.oracle.com/errata/ELSA-2022-0825.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://www.openwall.com/lists/oss-security/2022/01/27/4
|
linux-libc-dev |
CVE-2022-23036 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23037 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23038 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23039 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23040 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23041 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23042 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-24958 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-24958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74 https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/ https://nvd.nist.gov/vuln/detail/CVE-2022-24958 https://security.netapp.com/advisory/ntap-20220225-0008/
|
linux-libc-dev |
CVE-2022-25258 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-25258 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258 https://github.com/szymonh/d-os-descriptor https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/ https://nvd.nist.gov/vuln/detail/CVE-2022-25258 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2022-25375 |
MEDIUM |
5.4.0-77.86 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1 https://access.redhat.com/security/cve/CVE-2022-25375 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375 https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4) https://github.com/szymonh/rndis-co https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2022-25375 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2022-26490 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-26490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490 https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1) https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/ https://nvd.nist.gov/vuln/detail/CVE-2022-26490
|
linux-libc-dev |
CVE-2022-26966 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-26966 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966 https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062 https://nvd.nist.gov/vuln/detail/CVE-2022-26966
|
linux-libc-dev |
CVE-2022-27223 |
MEDIUM |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-27223 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223 https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6) https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d https://nvd.nist.gov/vuln/detail/CVE-2022-27223
|
linux-libc-dev |
CVE-2017-0537 |
LOW |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/96831 http://www.securitytracker.com/id/1037968 https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537 https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t https://source.android.com/security/bulletin/2017-01-01.html https://source.android.com/security/bulletin/2017-03-01 https://source.android.com/security/bulletin/2017-03-01.html
|
linux-libc-dev |
CVE-2017-13165 |
LOW |
5.4.0-77.86 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165 https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a https://source.android.com/security/bulletin/pixel/2017-12-01
|
linux-libc-dev |
CVE-2017-13693 |
LOW |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/100502 https://access.redhat.com/security/cve/CVE-2017-13693 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693 https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 https://patchwork.kernel.org/patch/9919053/
|
linux-libc-dev |
CVE-2018-1121 |
LOW |
5.4.0-77.86 |
|
Expand...http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1121 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
linux-libc-dev |
CVE-2018-12928 |
LOW |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/104593 https://access.redhat.com/security/cve/CVE-2018-12928 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928 https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/ https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
|
linux-libc-dev |
CVE-2018-12929 |
LOW |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/104588 https://access.redhat.com/errata/RHSA-2019:0641 https://access.redhat.com/security/cve/CVE-2018-12929 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929 https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
|
linux-libc-dev |
CVE-2018-12930 |
LOW |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/104588 https://access.redhat.com/errata/RHSA-2019:0641 https://access.redhat.com/security/cve/CVE-2018-12930 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930 https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
|
linux-libc-dev |
CVE-2018-12931 |
LOW |
5.4.0-77.86 |
|
Expand...http://www.securityfocus.com/bid/104588 https://access.redhat.com/errata/RHSA-2019:0641 https://access.redhat.com/security/cve/CVE-2018-12931 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931 https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
|
linux-libc-dev |
CVE-2019-14899 |
LOW |
5.4.0-77.86 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2020/Jul/23 http://seclists.org/fulldisclosure/2020/Jul/24 http://seclists.org/fulldisclosure/2020/Jul/25 http://seclists.org/fulldisclosure/2020/Nov/20 http://www.openwall.com/lists/oss-security/2020/08/13/2 http://www.openwall.com/lists/oss-security/2020/10/07/3 https://access.redhat.com/security/cve/CVE-2019-14899 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899 https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/ https://support.apple.com/kb/HT211288 https://support.apple.com/kb/HT211289 https://support.apple.com/kb/HT211290 https://support.apple.com/kb/HT211850 https://support.apple.com/kb/HT211931 https://www.openwall.com/lists/oss-security/2019/12/05/1
|
linux-libc-dev |
CVE-2019-15213 |
LOW |
5.4.0-77.86 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://www.openwall.com/lists/oss-security/2019/08/20/2 https://access.redhat.com/security/cve/CVE-2019-15213 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7 https://linux.oracle.com/cve/CVE-2019-15213.html https://linux.oracle.com/errata/ELSA-2019-4872.html https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/ https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
|
linux-libc-dev |
CVE-2019-16230 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-16230 https://bugzilla.suse.com/show_bug.cgi?id=1150468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230 https://lkml.org/lkml/2019/9/9/487 https://security.netapp.com/advisory/ntap-20191004-0001/
|
linux-libc-dev |
CVE-2019-19378 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-19378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378 https://security.netapp.com/advisory/ntap-20200103-0001/
|
linux-libc-dev |
CVE-2019-19449 |
LOW |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19449 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2019-19814 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-19814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814 https://security.netapp.com/advisory/ntap-20200103-0001/
|
linux-libc-dev |
CVE-2020-11725 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-11725 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725 https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474 https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/ https://nvd.nist.gov/vuln/detail/CVE-2020-11725 https://twitter.com/yabbadabbadrew/status/1248632267028582400
|
linux-libc-dev |
CVE-2020-12363 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-12363 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363 https://linux.oracle.com/cve/CVE-2020-12363.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
linux-libc-dev |
CVE-2020-12364 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-12364 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364 https://linux.oracle.com/cve/CVE-2020-12364.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
linux-libc-dev |
CVE-2020-14304 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-14304 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304 https://linux.oracle.com/cve/CVE-2020-14304.html https://linux.oracle.com/errata/ELSA-2021-9410.html https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
|
linux-libc-dev |
CVE-2020-27820 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-27820 https://bugzilla.redhat.com/show_bug.cgi?id=1901726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820 https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/ https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5278-1
|
linux-libc-dev |
CVE-2020-35501 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35501 https://bugzilla.redhat.com/show_bug.cgi?id=1908577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501 https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html https://www.openwall.com/lists/oss-security/2021/02/18/1
|
linux-libc-dev |
CVE-2021-26934 |
LOW |
5.4.0-77.86 |
|
Expand...http://xenbits.xen.org/xsa/advisory-363.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/ https://nvd.nist.gov/vuln/detail/CVE-2021-26934 https://security.netapp.com/advisory/ntap-20210326-0001/ https://www.openwall.com/lists/oss-security/2021/02/16/2 https://xenbits.xen.org/xsa/advisory-363.html
|
linux-libc-dev |
CVE-2021-28711 |
LOW |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-28711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-391.html https://xenbits.xenproject.org/xsa/advisory-391.txt
|
linux-libc-dev |
CVE-2021-28712 |
LOW |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-28712 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-391.html https://xenbits.xenproject.org/xsa/advisory-391.txt
|
linux-libc-dev |
CVE-2021-28713 |
LOW |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-28713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-391.html https://xenbits.xenproject.org/xsa/advisory-391.txt
|
linux-libc-dev |
CVE-2021-32078 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-32078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1) https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f https://kirtikumarar.com/CVE-2021-32078.txt https://nvd.nist.gov/vuln/detail/CVE-2021-32078 https://security.netapp.com/advisory/ntap-20210813-0002/
|
linux-libc-dev |
CVE-2021-3428 |
LOW |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3428 https://bugzilla.redhat.com/show_bug.cgi?id=1972621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428 https://linux.oracle.com/cve/CVE-2021-3428.html https://linux.oracle.com/errata/ELSA-2021-9223.html https://ubuntu.com/security/CVE-2021-3428 https://ubuntu.com/security/notices/USN-4979-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/03/17/1 https://www.openwall.com/lists/oss-security/2021/03/17/13 https://www.openwall.com/lists/oss-security/2021/03/17/5
|
linux-libc-dev |
CVE-2021-34693 |
LOW |
5.4.0-77.86 |
5.4.0-81.91 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/15/1 https://access.redhat.com/security/cve/CVE-2021-34693 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693 https://linux.oracle.com/cve/CVE-2021-34693.html https://linux.oracle.com/errata/ELSA-2021-9453.html https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-34693 https://ubuntu.com/security/notices/USN-5045-1 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5073-3 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4941 https://www.openwall.com/lists/oss-security/2021/06/15/1
|
linux-libc-dev |
CVE-2021-34981 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-34981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981 https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
|
linux-libc-dev |
CVE-2021-3669 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669 https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
|
linux-libc-dev |
CVE-2021-3679 |
LOW |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3679 https://bugzilla.redhat.com/show_bug.cgi?id=1989165 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679 https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a https://linux.oracle.com/cve/CVE-2021-3679.html https://linux.oracle.com/errata/ELSA-2021-9488.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/ https://nvd.nist.gov/vuln/detail/CVE-2021-3679 https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5091-2 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5094-1 https://ubuntu.com/security/notices/USN-5094-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4978
|
linux-libc-dev |
CVE-2021-37159 |
LOW |
5.4.0-77.86 |
5.4.0-91.102 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37159 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159 https://linux.oracle.com/cve/CVE-2021-37159.html https://linux.oracle.com/errata/ELSA-2021-9475.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-37159 https://security.netapp.com/advisory/ntap-20210819-0003/ https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5163-1 https://ubuntu.com/security/notices/USN-5164-1 https://www.spinics.net/lists/linux-usb/msg202228.html
|
linux-libc-dev |
CVE-2021-3739 |
LOW |
5.4.0-77.86 |
5.4.0-90.101 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3739 https://bugzilla.redhat.com/show_bug.cgi?id=1997958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 https://linux.oracle.com/cve/CVE-2021-3739.html https://linux.oracle.com/errata/ELSA-2021-9475.html https://lore.kernel.org/linux-btrfs/20210806102415.304717-1-wqu@suse.com/T/#u https://nvd.nist.gov/vuln/detail/CVE-2021-3739 https://ubuntu.com/security/CVE-2021-3739 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5117-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/08/25/3
|
linux-libc-dev |
CVE-2021-3744 |
LOW |
5.4.0-77.86 |
5.4.0-91.102 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3744 https://bugzilla.redhat.com/show_bug.cgi?id=2000627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744 https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680 https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0 https://linux.oracle.com/cve/CVE-2021-3744.html https://linux.oracle.com/errata/ELSA-2021-9565.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-3744 https://seclists.org/oss-sec/2021/q3/164 https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5140-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1 https://ubuntu.com/security/notices/USN-5163-1 https://ubuntu.com/security/notices/USN-5164-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-3772 |
LOW |
5.4.0-77.86 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3772 https://bugzilla.redhat.com/show_bug.cgi?id=2000694 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-3772 https://ubuntu.com/security/CVE-2021-3772 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5265-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-38204 |
LOW |
5.4.0-77.86 |
5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/CVE-2021-38204 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-38204 https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5091-2 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5094-1 https://ubuntu.com/security/notices/USN-5094-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1
|
linux-libc-dev |
CVE-2021-38205 |
LOW |
5.4.0-77.86 |
5.4.0-89.100 |
Expand...https://access.redhat.com/security/cve/CVE-2021-38205 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205 https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37 https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-38205 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5094-1 https://ubuntu.com/security/notices/USN-5094-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2
|
linux-libc-dev |
CVE-2021-41864 |
LOW |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-41864 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a https://linux.oracle.com/cve/CVE-2021-41864.html https://linux.oracle.com/errata/ELSA-2021-9623.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-41864 https://security.netapp.com/advisory/ntap-20211029-0004/ https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5140-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2021-42008 |
LOW |
5.4.0-77.86 |
5.4.0-89.100 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42008 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008 https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793 https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-42008 https://security.netapp.com/advisory/ntap-20211104-0002/ https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.youtube.com/watch?v=d5f9xLK8Vhw
|
linux-libc-dev |
CVE-2021-43389 |
LOW |
5.4.0-77.86 |
5.4.0-92.103 |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1 https://access.redhat.com/security/cve/CVE-2021-43389 https://bugzilla.redhat.com/show_bug.cgi?id=2013180 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389 https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-43389 https://seclists.org/oss-sec/2021/q4/39 https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/10/19/1
|
linux-libc-dev |
CVE-2021-43976 |
LOW |
5.4.0-77.86 |
5.4.0-105.119 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976 https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ https://nvd.nist.gov/vuln/detail/CVE-2021-43976 https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/ https://security.netapp.com/advisory/ntap-20211210-0001/ https://ubuntu.com/security/notices/USN-5302-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5339-1 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
locales |
CVE-2021-3999 |
MEDIUM |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
locales |
CVE-2016-10228 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2019-25013 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2020-27618 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
locales |
CVE-2020-29562 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2020-6096 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
locales |
CVE-2021-27645 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://linux.oracle.com/cve/CVE-2021-27645.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/ https://sourceware.org/bugzilla/show_bug.cgi?id=27462 https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2021-3326 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
locales |
CVE-2021-35942 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2022-23218 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
locales |
CVE-2022-23219 |
LOW |
2.31-0ubuntu9.2 |
2.31-0ubuntu9.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
login |
CVE-2013-4235 |
LOW |
1:4.8.1-1ubuntu5.20.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-4235 https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
mount |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
mount |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
openssh-client |
CVE-2021-36368 |
MEDIUM |
1:8.2p1-4ubuntu0.2 |
|
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368 https://docs.ssh-mitm.at/trivialauth.html https://github.com/openssh/openssh-portable/pull/258 https://nvd.nist.gov/vuln/detail/CVE-2021-36368 https://www.openssh.com/security.html
|
openssh-client |
CVE-2020-14145 |
LOW |
1:8.2p1-4ubuntu0.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
openssh-client |
CVE-2021-41617 |
LOW |
1:8.2p1-4ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2021-9575.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1
|
openssh-server |
CVE-2021-36368 |
MEDIUM |
1:8.2p1-4ubuntu0.2 |
|
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368 https://docs.ssh-mitm.at/trivialauth.html https://github.com/openssh/openssh-portable/pull/258 https://nvd.nist.gov/vuln/detail/CVE-2021-36368 https://www.openssh.com/security.html
|
openssh-server |
CVE-2020-14145 |
LOW |
1:8.2p1-4ubuntu0.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
openssh-server |
CVE-2021-41617 |
LOW |
1:8.2p1-4ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2021-9575.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1
|
openssh-sftp-server |
CVE-2021-36368 |
MEDIUM |
1:8.2p1-4ubuntu0.2 |
|
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368 https://docs.ssh-mitm.at/trivialauth.html https://github.com/openssh/openssh-portable/pull/258 https://nvd.nist.gov/vuln/detail/CVE-2021-36368 https://www.openssh.com/security.html
|
openssh-sftp-server |
CVE-2020-14145 |
LOW |
1:8.2p1-4ubuntu0.2 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
openssh-sftp-server |
CVE-2021-41617 |
LOW |
1:8.2p1-4ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2021-9575.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1
|
openssl |
CVE-2021-3711 |
HIGH |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/security/cve/CVE-2021-3711 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2021-3711 https://rustsec.org/advisories/RUSTSEC-2021-0097.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://security.netapp.com/advisory/ntap-20211022-0003/ https://ubuntu.com/security/notices/USN-5051-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
openssl |
CVE-2022-0778 |
HIGH |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.12 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0778 https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9249.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.tenable.com/security/tns-2022-06
|
openssl |
CVE-2021-3712 |
MEDIUM |
1.1.1f-1ubuntu2.4 |
1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json https://access.redhat.com/security/cve/CVE-2021-3712 https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://nvd.nist.gov/vuln/detail/CVE-2021-3712 https://rustsec.org/advisories/RUSTSEC-2021-0098.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
passwd |
CVE-2013-4235 |
LOW |
1:4.8.1-1ubuntu5.20.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-4235 https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
patch |
CVE-2018-6952 |
LOW |
2.7.6-6 |
|
Expand...http://www.securityfocus.com/bid/103047 https://access.redhat.com/errata/RHSA-2019:2033 https://access.redhat.com/security/cve/CVE-2018-6952 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952 https://linux.oracle.com/cve/CVE-2018-6952.html https://linux.oracle.com/errata/ELSA-2019-2033.html https://nvd.nist.gov/vuln/detail/CVE-2018-6952 https://savannah.gnu.org/bugs/index.php?53133 https://security.gentoo.org/glsa/201904-17
|
patch |
CVE-2021-45261 |
LOW |
2.7.6-6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261 https://savannah.gnu.org/bugs/?61685
|
perl |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-base |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-modules-5.30 |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
policykit-1 |
CVE-2021-4034 |
HIGH |
0.105-26ubuntu1.1 |
0.105-26ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json https://access.redhat.com/security/cve/CVE-2021-4034 https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 https://bugzilla.redhat.com/show_bug.cgi?id=2025869 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034 https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 https://linux.oracle.com/cve/CVE-2021-4034.html https://linux.oracle.com/errata/ELSA-2022-9073.html https://nvd.nist.gov/vuln/detail/CVE-2021-4034 https://ubuntu.com/security/notices/USN-5252-1 https://ubuntu.com/security/notices/USN-5252-2 https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
|
policykit-1 |
CVE-2021-4115 |
MEDIUM |
0.105-26ubuntu1.1 |
0.105-26ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4115 https://access.redhat.com/security/cve/cve-2021-4115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115 https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ https://securitylab.github.com/advisories/GHSL-2021-077-polkit/ https://ubuntu.com/security/notices/USN-5304-1
|
policykit-1 |
CVE-2016-2568 |
LOW |
0.105-26ubuntu1.1 |
|
Expand...http://seclists.org/oss-sec/2016/q1/443 http://www.openwall.com/lists/oss-security/2016/02/26/3 https://access.redhat.com/security/cve/CVE-2016-2568 https://access.redhat.com/security/cve/cve-2016-2568 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062 https://bugzilla.redhat.com/show_bug.cgi?id=1300746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568 https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2568 https://ubuntu.com/security/CVE-2016-2568
|
python3-urllib3 |
CVE-2021-33503 |
LOW |
1.25.8-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-33503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503 https://github.com/advisories/GHSA-q2q7-5pp4-w6pg https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg https://linux.oracle.com/cve/CVE-2021-33503.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/ https://nvd.nist.gov/vuln/detail/CVE-2021-33503 https://security.gentoo.org/glsa/202107-36 https://www.oracle.com/security-alerts/cpuoct2021.html
|
python3.8 |
CVE-2021-29921 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst https://github.com/python/cpython/pull/12577 https://github.com/python/cpython/pull/25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://linux.oracle.com/cve/CVE-2021-29921.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
python3.8 |
CVE-2021-3737 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2021-4160.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
python3.8 |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1
|
python3.8-minimal |
CVE-2021-29921 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst https://github.com/python/cpython/pull/12577 https://github.com/python/cpython/pull/25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://linux.oracle.com/cve/CVE-2021-29921.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
python3.8-minimal |
CVE-2021-3737 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2021-4160.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
python3.8-minimal |
CVE-2022-0391 |
MEDIUM |
3.8.10-0ubuntu1~20.04 |
3.8.10-0ubuntu1~20.04.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1
|
rsync |
CVE-2018-25032 |
MEDIUM |
3.1.3-8 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2 http://www.openwall.com/lists/oss-security/2022/03/26/1 https://access.redhat.com/security/cve/CVE-2018-25032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032 https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 https://github.com/madler/zlib/issues/605 https://ubuntu.com/security/notices/USN-5355-1 https://ubuntu.com/security/notices/USN-5355-2 https://www.openwall.com/lists/oss-security/2022/03/24/1 https://www.openwall.com/lists/oss-security/2022/03/28/1 https://www.openwall.com/lists/oss-security/2022/03/28/3
|
samba-libs |
CVE-2021-44142 |
HIGH |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json https://access.redhat.com/security/cve/CVE-2021-44142 https://bugzilla.samba.org/show_bug.cgi?id=14914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 https://kb.cert.org/vuls/id/119678 https://linux.oracle.com/cve/CVE-2021-44142.html https://linux.oracle.com/errata/ELSA-2022-0332.html https://nvd.nist.gov/vuln/detail/CVE-2021-44142 https://ubuntu.com/security/notices/USN-5260-1 https://ubuntu.com/security/notices/USN-5260-2 https://ubuntu.com/security/notices/USN-5260-3 https://www.samba.org/samba/security/CVE-2021-44142.html https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
|
samba-libs |
CVE-2016-2124 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2016-2124 https://bugzilla.redhat.com/show_bug.cgi?id=2019660 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124 https://linux.oracle.com/cve/CVE-2016-2124.html https://linux.oracle.com/errata/ELSA-2021-5192.html https://nvd.nist.gov/vuln/detail/CVE-2016-2124 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2016-2124.html
|
samba-libs |
CVE-2020-25717 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25717 https://bugzilla.redhat.com/show_bug.cgi?id=2019672 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717 https://linux.oracle.com/cve/CVE-2020-25717.html https://linux.oracle.com/errata/ELSA-2021-5192.html https://nvd.nist.gov/vuln/detail/CVE-2020-25717 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25717.html
|
samba-libs |
CVE-2020-25718 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25718 https://bugzilla.redhat.com/show_bug.cgi?id=2019726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718 https://nvd.nist.gov/vuln/detail/CVE-2020-25718 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25718.html
|
samba-libs |
CVE-2020-25719 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25719 https://bugzilla.redhat.com/show_bug.cgi?id=2019732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719 https://linux.oracle.com/cve/CVE-2020-25719.html https://linux.oracle.com/errata/ELSA-2021-5195.html https://nvd.nist.gov/vuln/detail/CVE-2020-25719 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25719.html
|
samba-libs |
CVE-2020-25721 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25721 https://bugzilla.redhat.com/show_bug.cgi?id=2021728 https://bugzilla.samba.org/show_bug.cgi?id=14725 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25721.html
|
samba-libs |
CVE-2020-25722 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25722 https://bugzilla.redhat.com/show_bug.cgi?id=2019764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722 https://nvd.nist.gov/vuln/detail/CVE-2020-25722 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2020-25722.html
|
samba-libs |
CVE-2021-23192 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23192 https://bugzilla.redhat.com/show_bug.cgi?id=2019666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192 https://linux.oracle.com/cve/CVE-2021-23192.html https://linux.oracle.com/errata/ELSA-2021-5082.html https://nvd.nist.gov/vuln/detail/CVE-2021-23192 https://ubuntu.com/security/CVE-2021-23192 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2021-23192.html
|
samba-libs |
CVE-2021-3738 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3738 https://bugzilla.redhat.com/show_bug.cgi?id=2021726 https://bugzilla.samba.org/show_bug.cgi?id=14468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738 https://nvd.nist.gov/vuln/detail/CVE-2021-3738 https://ubuntu.com/security/notices/USN-5142-1 https://www.samba.org/samba/history/samba-4.13.14.html https://www.samba.org/samba/security/CVE-2021-3738.html
|
samba-libs |
CVE-2022-0336 |
MEDIUM |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0336 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 https://ubuntu.com/security/notices/USN-5260-1 https://www.samba.org/samba/security/CVE-2022-0336.html
|
samba-libs |
CVE-2021-3671 |
LOW |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
samba-libs |
CVE-2021-43566 |
LOW |
2:4.11.6+dfsg-0ubuntu1.9 |
2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43566 https://bugzilla.samba.org/show_bug.cgi?id=13979 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566 https://nvd.nist.gov/vuln/detail/CVE-2021-43566 https://ubuntu.com/security/notices/USN-5260-1 https://www.samba.org/samba/history/ https://www.samba.org/samba/security/CVE-2021-43566.html
|
sqlite3 |
CVE-2020-9794 |
MEDIUM |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 https://vuldb.com/?id.155768
|
sqlite3 |
CVE-2020-9849 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
sqlite3 |
CVE-2020-9991 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211847 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/kb/HT211846 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
sqlite3 |
CVE-2021-36690 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://nvd.nist.gov/vuln/detail/CVE-2021-36690 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
subversion |
CVE-2018-11803 |
MEDIUM |
1.13.0-3 |
|
Expand...http://www.securityfocus.com/bid/106770 https://access.redhat.com/security/cve/CVE-2018-11803 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803 https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E https://security.gentoo.org/glsa/201904-08 https://subversion.apache.org/security/CVE-2018-11803-advisory.txt https://ubuntu.com/security/notices/USN-3869-1 https://usn.ubuntu.com/3869-1/
|
subversion |
CVE-2020-17525 |
MEDIUM |
1.13.0-3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525 https://linux.oracle.com/cve/CVE-2020-17525.html https://linux.oracle.com/errata/ELSA-2021-0507.html https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html https://nvd.nist.gov/vuln/detail/CVE-2020-17525 https://subversion.apache.org/security/CVE-2020-17525-advisory.txt https://ubuntu.com/security/notices/USN-5322-1
|
sysstat |
CVE-2019-16167 |
LOW |
12.2.0-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html https://access.redhat.com/security/cve/CVE-2019-16167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16167 https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6 https://github.com/sysstat/sysstat/issues/230 https://linux.oracle.com/cve/CVE-2019-16167.html https://linux.oracle.com/errata/ELSA-2020-4638.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/ https://ubuntu.com/security/notices/USN-4242-1 https://usn.ubuntu.com/4242-1/
|
systemd |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
systemd |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
systemd |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
systemd-sysv |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
systemd-sysv |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
systemd-sysv |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
systemd-timesyncd |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
systemd-timesyncd |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
systemd-timesyncd |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
tar |
CVE-2021-20193 |
LOW |
1.30+dfsg-7ubuntu0.20.04.1 |
1.30+dfsg-7ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193 https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 https://savannah.gnu.org/bugs/?59897 https://security.gentoo.org/glsa/202105-29 https://ubuntu.com/security/notices/USN-5329-1
|
udev |
CVE-2021-33910 |
HIGH |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2021-33910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910 https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 https://linux.oracle.com/cve/CVE-2021-33910.html https://linux.oracle.com/errata/ELSA-2021-2717.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://nvd.nist.gov/vuln/detail/CVE-2021-33910 https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20211104-0008/ https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2 https://www.debian.org/security/2021/dsa-4942 https://www.openwall.com/lists/oss-security/2021/07/20/2 https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
udev |
CVE-2021-3997 |
MEDIUM |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.15 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
udev |
CVE-2020-13529 |
LOW |
245.4-4ubuntu3.7 |
245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
udisks2 |
CVE-2021-3802 |
LOW |
2.8.4-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3802 https://bugzilla.redhat.com/show_bug.cgi?id=2003649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802 https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt
|
unzip |
CVE-2022-0529 |
MEDIUM |
6.0-25ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0529 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529 https://github.com/ByteHackr/unzip_poc https://nvd.nist.gov/vuln/detail/CVE-2022-0529
|
unzip |
CVE-2021-4217 |
LOW |
6.0-25ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
|
unzip |
CVE-2022-0530 |
LOW |
6.0-25ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0530 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530 https://github.com/ByteHackr/unzip_poc https://nvd.nist.gov/vuln/detail/CVE-2022-0530
|
util-linux |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
util-linux |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
uuid-dev |
CVE-2021-3995 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
uuid-dev |
CVE-2021-3996 |
MEDIUM |
2.34-0.1ubuntu9.1 |
2.34-0.1ubuntu9.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes https://ubuntu.com/security/notices/USN-5279-1 https://www.openwall.com/lists/oss-security/2022/01/24/2
|
vim |
CVE-2021-3770 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/security/cve/CVE-2021-3770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770 https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3770 https://ubuntu.com/security/notices/USN-5093-1
|
vim |
CVE-2021-3778 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778 https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 https://linux.oracle.com/cve/CVE-2021-3778.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3778 https://ubuntu.com/security/notices/USN-5093-1
|
vim |
CVE-2021-3796 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796 https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d https://linux.oracle.com/cve/CVE-2021-3796.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3796 https://ubuntu.com/security/notices/USN-5093-1
|
vim |
CVE-2021-3872 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872 https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 https://linux.oracle.com/cve/CVE-2021-3872.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-3872 https://ubuntu.com/security/notices/USN-5147-1
|
vim |
CVE-2021-3927 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927 https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://ubuntu.com/security/notices/USN-5147-1
|
vim |
CVE-2021-3928 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928 https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3928 https://ubuntu.com/security/notices/USN-5147-1
|
vim |
CVE-2021-3984 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-3984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625) https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a https://linux.oracle.com/cve/CVE-2021-3984.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3984 https://ubuntu.com/security/notices/USN-5247-1
|
vim |
CVE-2021-4019 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-4019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669) https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 https://linux.oracle.com/cve/CVE-2021-4019.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-4019 https://ubuntu.com/security/notices/USN-5247-1
|
vim |
CVE-2021-4069 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4069 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ https://nvd.nist.gov/vuln/detail/CVE-2021-4069 https://ubuntu.com/security/notices/USN-5247-1
|
vim |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://support.apple.com/kb/HT213183
|
vim |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
vim |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def https://linux.oracle.com/cve/CVE-2022-0359.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0359
|
vim |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b https://linux.oracle.com/cve/CVE-2022-0361.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0361
|
vim |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0368
|
vim |
CVE-2021-3903 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903 https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://ubuntu.com/security/notices/USN-5147-1
|
vim |
CVE-2021-3974 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612) https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://ubuntu.com/security/notices/USN-5247-1
|
vim-common |
CVE-2021-3770 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/security/cve/CVE-2021-3770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770 https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3770 https://ubuntu.com/security/notices/USN-5093-1
|
vim-common |
CVE-2021-3778 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778 https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 https://linux.oracle.com/cve/CVE-2021-3778.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3778 https://ubuntu.com/security/notices/USN-5093-1
|
vim-common |
CVE-2021-3796 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796 https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d https://linux.oracle.com/cve/CVE-2021-3796.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3796 https://ubuntu.com/security/notices/USN-5093-1
|
vim-common |
CVE-2021-3872 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872 https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 https://linux.oracle.com/cve/CVE-2021-3872.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-3872 https://ubuntu.com/security/notices/USN-5147-1
|
vim-common |
CVE-2021-3927 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927 https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://ubuntu.com/security/notices/USN-5147-1
|
vim-common |
CVE-2021-3928 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928 https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3928 https://ubuntu.com/security/notices/USN-5147-1
|
vim-common |
CVE-2021-3984 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-3984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625) https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a https://linux.oracle.com/cve/CVE-2021-3984.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3984 https://ubuntu.com/security/notices/USN-5247-1
|
vim-common |
CVE-2021-4019 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-4019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669) https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 https://linux.oracle.com/cve/CVE-2021-4019.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-4019 https://ubuntu.com/security/notices/USN-5247-1
|
vim-common |
CVE-2021-4069 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4069 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ https://nvd.nist.gov/vuln/detail/CVE-2021-4069 https://ubuntu.com/security/notices/USN-5247-1
|
vim-common |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://support.apple.com/kb/HT213183
|
vim-common |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
vim-common |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def https://linux.oracle.com/cve/CVE-2022-0359.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0359
|
vim-common |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b https://linux.oracle.com/cve/CVE-2022-0361.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0361
|
vim-common |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0368
|
vim-common |
CVE-2021-3903 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903 https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://ubuntu.com/security/notices/USN-5147-1
|
vim-common |
CVE-2021-3974 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612) https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://ubuntu.com/security/notices/USN-5247-1
|
vim-runtime |
CVE-2021-3770 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/security/cve/CVE-2021-3770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770 https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3770 https://ubuntu.com/security/notices/USN-5093-1
|
vim-runtime |
CVE-2021-3778 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778 https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 https://linux.oracle.com/cve/CVE-2021-3778.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3778 https://ubuntu.com/security/notices/USN-5093-1
|
vim-runtime |
CVE-2021-3796 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796 https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d https://linux.oracle.com/cve/CVE-2021-3796.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3796 https://ubuntu.com/security/notices/USN-5093-1
|
vim-runtime |
CVE-2021-3872 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872 https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 https://linux.oracle.com/cve/CVE-2021-3872.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-3872 https://ubuntu.com/security/notices/USN-5147-1
|
vim-runtime |
CVE-2021-3927 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927 https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://ubuntu.com/security/notices/USN-5147-1
|
vim-runtime |
CVE-2021-3928 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928 https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3928 https://ubuntu.com/security/notices/USN-5147-1
|
vim-runtime |
CVE-2021-3984 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-3984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625) https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a https://linux.oracle.com/cve/CVE-2021-3984.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3984 https://ubuntu.com/security/notices/USN-5247-1
|
vim-runtime |
CVE-2021-4019 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-4019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669) https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 https://linux.oracle.com/cve/CVE-2021-4019.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-4019 https://ubuntu.com/security/notices/USN-5247-1
|
vim-runtime |
CVE-2021-4069 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4069 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ https://nvd.nist.gov/vuln/detail/CVE-2021-4069 https://ubuntu.com/security/notices/USN-5247-1
|
vim-runtime |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://support.apple.com/kb/HT213183
|
vim-runtime |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
vim-runtime |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def https://linux.oracle.com/cve/CVE-2022-0359.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0359
|
vim-runtime |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b https://linux.oracle.com/cve/CVE-2022-0361.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0361
|
vim-runtime |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0368
|
vim-runtime |
CVE-2021-3903 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903 https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://ubuntu.com/security/notices/USN-5147-1
|
vim-runtime |
CVE-2021-3974 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612) https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://ubuntu.com/security/notices/USN-5247-1
|
wget |
CVE-2021-31879 |
MEDIUM |
1.20.3-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-31879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879 https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html https://nvd.nist.gov/vuln/detail/CVE-2021-31879 https://savannah.gnu.org/bugs/?56909 https://security.netapp.com/advisory/ntap-20210618-0002/
|
x11-common |
CVE-2012-1093 |
LOW |
1:7.7+19ubuntu14 |
|
Expand...http://vladz.devzero.fr/012_x11-common-vuln.html http://www.openwall.com/lists/oss-security/2012/02/29/1 http://www.openwall.com/lists/oss-security/2012/03/01/1 https://access.redhat.com/security/cve/cve-2012-1093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2012-1093
|
xxd |
CVE-2021-3770 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/security/cve/CVE-2021-3770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770 https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365 https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3770 https://ubuntu.com/security/notices/USN-5093-1
|
xxd |
CVE-2021-3778 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778 https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 https://linux.oracle.com/cve/CVE-2021-3778.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3778 https://ubuntu.com/security/notices/USN-5093-1
|
xxd |
CVE-2021-3796 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796 https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d https://linux.oracle.com/cve/CVE-2021-3796.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3796 https://ubuntu.com/security/notices/USN-5093-1
|
xxd |
CVE-2021-3872 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872 https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 https://linux.oracle.com/cve/CVE-2021-3872.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-3872 https://ubuntu.com/security/notices/USN-5147-1
|
xxd |
CVE-2021-3927 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927 https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://ubuntu.com/security/notices/USN-5147-1
|
xxd |
CVE-2021-3928 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928 https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3928 https://ubuntu.com/security/notices/USN-5147-1
|
xxd |
CVE-2021-3984 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-3984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625) https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a https://linux.oracle.com/cve/CVE-2021-3984.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3984 https://ubuntu.com/security/notices/USN-5247-1
|
xxd |
CVE-2021-4019 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-4019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669) https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 https://linux.oracle.com/cve/CVE-2021-4019.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-4019 https://ubuntu.com/security/notices/USN-5247-1
|
xxd |
CVE-2021-4069 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4069 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ https://nvd.nist.gov/vuln/detail/CVE-2021-4069 https://ubuntu.com/security/notices/USN-5247-1
|
xxd |
CVE-2021-4166 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://support.apple.com/kb/HT213183
|
xxd |
CVE-2022-0351 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
|
xxd |
CVE-2022-0359 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def https://linux.oracle.com/cve/CVE-2022-0359.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0359
|
xxd |
CVE-2022-0361 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215) https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b https://linux.oracle.com/cve/CVE-2022-0361.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0361
|
xxd |
CVE-2022-0368 |
MEDIUM |
2:8.1.2269-1ubuntu5 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368 https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0368
|
xxd |
CVE-2021-3903 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903 https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://ubuntu.com/security/notices/USN-5147-1
|
xxd |
CVE-2021-3974 |
LOW |
2:8.1.2269-1ubuntu5 |
2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612) https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://ubuntu.com/security/notices/USN-5247-1
|
zlib1g |
CVE-2018-25032 |
MEDIUM |
1:1.2.11.dfsg-2ubuntu1.2 |
1:1.2.11.dfsg-2ubuntu1.3 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2 http://www.openwall.com/lists/oss-security/2022/03/26/1 https://access.redhat.com/security/cve/CVE-2018-25032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032 https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 https://github.com/madler/zlib/issues/605 https://ubuntu.com/security/notices/USN-5355-1 https://ubuntu.com/security/notices/USN-5355-2 https://www.openwall.com/lists/oss-security/2022/03/24/1 https://www.openwall.com/lists/oss-security/2022/03/28/1 https://www.openwall.com/lists/oss-security/2022/03/28/3
|
zlib1g-dev |
CVE-2018-25032 |
MEDIUM |
1:1.2.11.dfsg-2ubuntu1.2 |
1:1.2.11.dfsg-2ubuntu1.3 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2 http://www.openwall.com/lists/oss-security/2022/03/26/1 https://access.redhat.com/security/cve/CVE-2018-25032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032 https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 https://github.com/madler/zlib/issues/605 https://ubuntu.com/security/notices/USN-5355-1 https://ubuntu.com/security/notices/USN-5355-2 https://www.openwall.com/lists/oss-security/2022/03/24/1 https://www.openwall.com/lists/oss-security/2022/03/28/1 https://www.openwall.com/lists/oss-security/2022/03/28/3
|
zsh |
CVE-2021-45444 |
LOW |
5.8-3ubuntu1 |
5.8-3ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-45444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444 https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-45444 https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/ https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/ https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/ https://ubuntu.com/security/notices/USN-5325-1 https://vuln.ryotak.me/advisories/63 https://www.debian.org/security/2022/dsa-5078 https://www.zsh.org/mla/announce/msg00133.html https://zsh.sourceforge.io/releases.html
|
zsh-common |
CVE-2021-45444 |
LOW |
5.8-3ubuntu1 |
5.8-3ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-45444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444 https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-45444 https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/ https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/ https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/ https://ubuntu.com/security/notices/USN-5325-1 https://vuln.ryotak.me/advisories/63 https://www.debian.org/security/2022/dsa-5078 https://www.zsh.org/mla/announce/msg00133.html https://zsh.sourceforge.io/releases.html
|