TrueChartsClone/charts/stable/xbackbone/security.md

938 lines
1.3 MiB
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
hide:
- toc
---
# Security Overview
<link href="https://truecharts.org/_static/trivy.css" type="text/css" rel="stylesheet" />
## Helm-Chart
##### Scan Results
#### Chart Object: xbackbone/charts/mariadb/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-mariadb&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | <details><summary>Expand...</summary> Enforcing CPU limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;resources.limits.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv011">https://avd.aquasec.com/appshield/ksv011</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-mariadb&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | <details><summary>Expand...</summary> When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;resources.requests.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv015">https://avd.aquasec.com/appshield/ksv015</a><br></details> |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | <details><summary>Expand...</summary> When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;resources.requests.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv016">https://avd.aquasec.com/appshield/ksv016</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv017">https://avd.aquasec.com/appshield/ksv017</a><br></details> |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | <details><summary>Expand...</summary> Enforcing memory limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;resources.limits.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv018">https://avd.aquasec.com/appshield/ksv018</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-mariadb&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-mariadb&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | <details><summary>Expand...</summary> HostPath volumes must be forbidden. <br> <hr> <br> StatefulSet &#39;RELEASE-NAME-mariadb&#39; should not set &#39;spec.template.volumes.hostPath&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv023">https://avd.aquasec.com/appshield/ksv023</a><br></details> |
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> StatefulSet &#39;RELEASE-NAME-mariadb&#39; should set &#39;spec.securityContext.runAsGroup&#39;, &#39;spec.securityContext.supplementalGroups[*]&#39; and &#39;spec.securityContext.fsGroup&#39; to integer greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv029">https://avd.aquasec.com/appshield/ksv029</a><br></details> |
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;mariadb-init&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-xbackbone&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | <details><summary>Expand...</summary> Enforcing CPU limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;resources.limits.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv011">https://avd.aquasec.com/appshield/ksv011</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;RELEASE-NAME-xbackbone&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;mariadb-init&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-xbackbone&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;mariadb-init&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | <details><summary>Expand...</summary> When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;resources.requests.cpu&#39; </details>| <details><summary>Expand...</summary><a href="https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits">https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits</a><br><a href="https://avd.aquasec.com/appshield/ksv015">https://avd.aquasec.com/appshield/ksv015</a><br></details> |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | <details><summary>Expand...</summary> When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;resources.requests.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv016">https://avd.aquasec.com/appshield/ksv016</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv017">https://avd.aquasec.com/appshield/ksv017</a><br></details> |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | <details><summary>Expand...</summary> Enforcing memory limits prevents DoS via resource exhaustion. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;resources.limits.memory&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-resources-limits-memory/">https://kubesec.io/basics/containers-resources-limits-memory/</a><br><a href="https://avd.aquasec.com/appshield/ksv018">https://avd.aquasec.com/appshield/ksv018</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-xbackbone&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;mariadb-init&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-xbackbone&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;hostpatch&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;mariadb-init&#39; of Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | <details><summary>Expand...</summary> HostPath volumes must be forbidden. <br> <hr> <br> Deployment &#39;RELEASE-NAME-xbackbone&#39; should not set &#39;spec.template.volumes.hostPath&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/appshield/ksv023">https://avd.aquasec.com/appshield/ksv023</a><br></details> |
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> Deployment &#39;RELEASE-NAME-xbackbone&#39; should set &#39;spec.securityContext.runAsGroup&#39;, &#39;spec.securityContext.supplementalGroups[*]&#39; and &#39;spec.securityContext.fsGroup&#39; to integer greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv029">https://avd.aquasec.com/appshield/ksv029</a><br></details> |
## Containers
##### Detected Containers
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/mariadb:v10.7.4@sha256:3c98ce702e0a3bfcb7dc3eb39af7b2ce4f224be0af8b9f4462a51fde9643905c
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/mariadb:v10.7.4@sha256:03994a8d64de07be33cd0ee744dcd89eb3e0ae7138f146c33568eec910269f14
tccr.io/truecharts/xbackbone:v3.3.3@sha256:c22e8806732b5a63a9761d413f4dd3a39af9427a12818e8ff769094ebc141c99
##### Scan Results
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-2201.html">https://errata.almalinux.org/8/ALSA-2022-2201.html</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4">https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4</a><br><a href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5</a><br><a href="https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ">https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25032.html">https://linux.oracle.com/cve/CVE-2018-25032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-2213.html">https://linux.oracle.com/errata/ELSA-2022-2213.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">https://nvd.nist.gov/vuln/detail/CVE-2018-25032</a><br><a href="https://security.netapp.com/advisory/ntap-20220526-0009/">https://security.netapp.com/advisory/ntap-20220526-0009/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://ubuntu.com/security/notices/USN-5359-1">https://ubuntu.com/security/notices/USN-5359-1</a><br><a href="https://www.debian.org/security/2022/dsa-5111">https://www.debian.org/security/2022/dsa-5111</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-2201.html">https://errata.almalinux.org/8/ALSA-2022-2201.html</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4">https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4</a><br><a href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5</a><br><a href="https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ">https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25032.html">https://linux.oracle.com/cve/CVE-2018-25032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-2213.html">https://linux.oracle.com/errata/ELSA-2022-2213.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">https://nvd.nist.gov/vuln/detail/CVE-2018-25032</a><br><a href="https://security.netapp.com/advisory/ntap-20220526-0009/">https://security.netapp.com/advisory/ntap-20220526-0009/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://ubuntu.com/security/notices/USN-5359-1">https://ubuntu.com/security/notices/USN-5359-1</a><br><a href="https://www.debian.org/security/2022/dsa-5111">https://www.debian.org/security/2022/dsa-5111</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/mariadb:v10.7.4@sha256:3c98ce702e0a3bfcb7dc3eb39af7b2ce4f224be0af8b9f4462a51fde9643905c (debian 10.12)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| bash | CVE-2019-18276 | LOW | 5.0-4 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html">http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18276">https://access.redhat.com/security/cve/CVE-2019-18276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a><br><a href="https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff">https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a><br><a href="https://linux.oracle.com/cve/CVE-2019-18276.html">https://linux.oracle.com/cve/CVE-2019-18276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1679.html">https://linux.oracle.com/errata/ELSA-2021-1679.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">https://nvd.nist.gov/vuln/detail/CVE-2019-18276</a><br><a href="https://security.gentoo.org/glsa/202105-34">https://security.gentoo.org/glsa/202105-34</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0003/">https://security.netapp.com/advisory/ntap-20200430-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5380-1">https://ubuntu.com/security/notices/USN-5380-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a><br></details> |
| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| coreutils | CVE-2016-2781 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| coreutils | CVE-2017-18018 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18018">https://access.redhat.com/security/cve/CVE-2017-18018</a><br></details> |
| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27781">https://access.redhat.com/security/cve/CVE-2022-27781</a><br><a href="https://curl.se/docs/CVE-2022-27781.html">https://curl.se/docs/CVE-2022-27781.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781</a><br><a href="https://github.com/curl/curl/commit/f6c335d63f">https://github.com/curl/curl/commit/f6c335d63f</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27782">https://access.redhat.com/security/cve/CVE-2022-27782</a><br><a href="https://curl.se/docs/CVE-2022-27782.html">https://curl.se/docs/CVE-2022-27782.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4511.html">https://errata.almalinux.org/8/ALSA-2021-4511.html</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7 | 1.19.8 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664</a><br></details> |
| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br></details> |
| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27781">https://access.redhat.com/security/cve/CVE-2022-27781</a><br><a href="https://curl.se/docs/CVE-2022-27781.html">https://curl.se/docs/CVE-2022-27781.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781</a><br><a href="https://github.com/curl/curl/commit/f6c335d63f">https://github.com/curl/curl/commit/f6c335d63f</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27782">https://access.redhat.com/security/cve/CVE-2022-27782</a><br><a href="https://curl.se/docs/CVE-2022-27782.html">https://curl.se/docs/CVE-2022-27782.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4511.html">https://errata.almalinux.org/8/ALSA-2021-4511.html</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8457">https://access.redhat.com/security/cve/CVE-2019-8457</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://linux.oracle.com/cve/CVE-2019-8457.html">https://linux.oracle.com/cve/CVE-2019-8457.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/</a><br><a href="https://security.netapp.com/advisory/ntap-20190606-0002/">https://security.netapp.com/advisory/ntap-20190606-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4004-1">https://ubuntu.com/security/notices/USN-4004-1</a><br><a href="https://ubuntu.com/security/notices/USN-4004-2">https://ubuntu.com/security/notices/USN-4004-2</a><br><a href="https://ubuntu.com/security/notices/USN-4019-1">https://ubuntu.com/security/notices/USN-4019-1</a><br><a href="https://ubuntu.com/security/notices/USN-4019-2">https://ubuntu.com/security/notices/USN-4019-2</a><br><a href="https://usn.ubuntu.com/4004-1/">https://usn.ubuntu.com/4004-1/</a><br><a href="https://usn.ubuntu.com/4004-2/">https://usn.ubuntu.com/4004-2/</a><br><a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a><br><a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a><br><a href="https://www.sqlite.org/releaselog/3_28_0.html">https://www.sqlite.org/releaselog/3_28_0.html</a><br><a href="https://www.sqlite.org/src/info/90acdbfce9c08858">https://www.sqlite.org/src/info/90acdbfce9c08858</a><br></details> |
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33560">https://access.redhat.com/security/cve/CVE-2021-33560</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href="https://dev.gnupg.org/T5305">https://dev.gnupg.org/T5305</a><br><a href="https://dev.gnupg.org/T5328">https://dev.gnupg.org/T5328</a><br><a href="https://dev.gnupg.org/T5466">https://dev.gnupg.org/T5466</a><br><a href="https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61">https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4409.html">https://errata.almalinux.org/8/ALSA-2021-4409.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33560.html">https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9263.html">https://linux.oracle.com/errata/ELSA-2022-9263.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">https://nvd.nist.gov/vuln/detail/CVE-2021-33560</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/10/02/2">http://www.openwall.com/lists/oss-security/2019/10/02/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13627">https://access.redhat.com/security/cve/CVE-2019-13627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</a><br><a href="https://dev.gnupg.org/T4683">https://dev.gnupg.org/T4683</a><br><a href="https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5">https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13627.html">https://linux.oracle.com/cve/CVE-2019-13627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4482.html">https://linux.oracle.com/errata/ELSA-2020-4482.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html</a><br><a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">https://security-tracker.debian.org/tracker/CVE-2019-13627</a><br><a href="https://security.gentoo.org/glsa/202003-32">https://security.gentoo.org/glsa/202003-32</a><br><a href="https://ubuntu.com/security/notices/USN-4236-1">https://ubuntu.com/security/notices/USN-4236-1</a><br><a href="https://ubuntu.com/security/notices/USN-4236-2">https://ubuntu.com/security/notices/USN-4236-2</a><br><a href="https://ubuntu.com/security/notices/USN-4236-3">https://ubuntu.com/security/notices/USN-4236-3</a><br><a href="https://usn.ubuntu.com/4236-1/">https://usn.ubuntu.com/4236-1/</a><br><a href="https://usn.ubuntu.com/4236-2/">https://usn.ubuntu.com/4236-2/</a><br><a href="https://usn.ubuntu.com/4236-3/">https://usn.ubuntu.com/4236-3/</a><br></details> |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6829">https://access.redhat.com/security/cve/CVE-2018-6829</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a><br><a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4209">https://access.redhat.com/security/cve/CVE-2021-4209</a><br></details> |
| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a><br><a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a><br><a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a><br><a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a><br><a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a><br><a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a><br><a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a><br><a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a><br><a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a><br><a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a><br><a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a><br><a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a><br><a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a><br><a href="http://osvdb.org/74829">http://osvdb.org/74829</a><br><a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a><br><a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a><br><a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a><br><a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a><br><a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a><br><a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a><br><a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a><br><a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a><br><a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a><br><a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a><br><a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a><br><a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a><br><a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a><br><a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a><br><a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a><br><a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a><br><a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a><br><a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a><br><a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a><br><a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a><br><a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a><br><a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a><br><a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a><br><a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a><br><a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a><br><a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a><br><a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a><br><a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a><br><a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a><br><a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a><br><a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a><br><a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a><br><a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a><br><a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a><br><a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a><br><a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a><br><a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-3389">https://access.redhat.com/security/cve/CVE-2011-3389</a><br><a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a><br><a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a><br><a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a><br><a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a><br><a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a><br><a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a><br><a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a><br></details> |
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290</a><br><a href="https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5">https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5</a><br><a href="https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de">https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de</a><br><a href="https://gitlab.com/libidn/libidn2/merge_requests/71">https://gitlab.com/libidn/libidn2/merge_requests/71</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/</a><br><a href="https://security.gentoo.org/glsa/202003-63">https://security.gentoo.org/glsa/202003-63</a><br><a href="https://ubuntu.com/security/notices/USN-4168-1">https://ubuntu.com/security/notices/USN-4168-1</a><br><a href="https://usn.ubuntu.com/4168-1/">https://usn.ubuntu.com/4168-1/</a><br></details> |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17543">https://access.redhat.com/security/cve/CVE-2019-17543</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a><br><a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a><br><a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a><br><a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a><br><a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a><br><a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11080">https://access.redhat.com/security/cve/CVE-2020-11080</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-2852.html">https://errata.almalinux.org/8/ALSA-2020-2852.html</a><br><a href="https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090">https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090</a><br><a href="https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394">https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394</a><br><a href="https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr">https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11080.html">https://linux.oracle.com/cve/CVE-2020-11080.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5765.html">https://linux.oracle.com/errata/ELSA-2020-5765.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">https://nvd.nist.gov/vuln/detail/CVE-2020-11080</a><br><a href="https://www.debian.org/security/2020/dsa-4696">https://www.debian.org/security/2020/dsa-4696</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4373.html">https://errata.almalinux.org/8/ALSA-2021-4373.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://ubuntu.com/security/notices/USN-5425-1">https://ubuntu.com/security/notices/USN-5425-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4373.html">https://errata.almalinux.org/8/ALSA-2021-4373.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://ubuntu.com/security/notices/USN-5425-1">https://ubuntu.com/security/notices/USN-5425-1</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html</a><br><a href="http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html">http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3624">https://access.redhat.com/errata/RHSA-2019:3624</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9893">https://access.redhat.com/security/cve/CVE-2019-9893</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893</a><br><a href="https://github.com/seccomp/libseccomp/issues/139">https://github.com/seccomp/libseccomp/issues/139</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9893.html">https://linux.oracle.com/cve/CVE-2019-9893.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3624.html">https://linux.oracle.com/errata/ELSA-2019-3624.html</a><br><a href="https://seclists.org/oss-sec/2019/q1/179">https://seclists.org/oss-sec/2019/q1/179</a><br><a href="https://security.gentoo.org/glsa/201904-18">https://security.gentoo.org/glsa/201904-18</a><br><a href="https://ubuntu.com/security/notices/USN-4001-1">https://ubuntu.com/security/notices/USN-4001-1</a><br><a href="https://ubuntu.com/security/notices/USN-4001-2">https://ubuntu.com/security/notices/USN-4001-2</a><br><a href="https://usn.ubuntu.com/4001-1/">https://usn.ubuntu.com/4001-1/</a><br><a href="https://usn.ubuntu.com/4001-2/">https://usn.ubuntu.com/4001-2/</a><br><a href="https://www.openwall.com/lists/oss-security/2019/03/15/1">https://www.openwall.com/lists/oss-security/2019/03/15/1</a><br></details> |
| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36084">https://access.redhat.com/security/cve/CVE-2021-36084</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3">https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36084.html">https://linux.oracle.com/cve/CVE-2021-36084.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36085">https://access.redhat.com/security/cve/CVE-2021-36085</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba">https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36085.html">https://linux.oracle.com/cve/CVE-2021-36085.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36086">https://access.redhat.com/security/cve/CVE-2021-36086</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36086.html">https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36087">https://access.redhat.com/security/cve/CVE-2021-36087</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521">https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36087.html">https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-13115">https://access.redhat.com/security/cve/CVE-2019-13115</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow/">https://blog.semmle.com/libssh2-integer-overflow/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115</a><br><a href="https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa">https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa</a><br><a href="https://github.com/libssh2/libssh2/pull/350">https://github.com/libssh2/libssh2/pull/350</a><br><a href="https://libssh2.org/changes.html">https://libssh2.org/changes.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0002/">https://security.netapp.com/advisory/ntap-20190806-0002/</a><br><a href="https://support.f5.com/csp/article/K13322484">https://support.f5.com/csp/article/K13322484</a><br><a href="https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17498">https://access.redhat.com/security/cve/CVE-2019-17498</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/">https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498</a><br><a href="https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498">https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498</a><br><a href="https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480">https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480</a><br><a href="https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c">https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c</a><br><a href="https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94">https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17498.html">https://linux.oracle.com/cve/CVE-2019-17498.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3915.html">https://linux.oracle.com/errata/ELSA-2020-3915.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">https://nvd.nist.gov/vuln/detail/CVE-2019-17498</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000654">https://access.redhat.com/security/cve/CVE-2018-1000654</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654</a><br><a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-5352-1">https://ubuntu.com/security/notices/USN-5352-1</a><br></details> |
| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u4 | | <details><summary>Expand...</summary><a href="http://xmlsoft.org/news.html">http://xmlsoft.org/news.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16932">https://access.redhat.com/security/cve/CVE-2017-16932</a><br><a href="https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html">https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=759579">https://bugzilla.gnome.org/show_bug.cgi?id=759579</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932</a><br><a href="https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961">https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961</a><br><a href="https://github.com/sparklemotion/nokogiri/issues/1714">https://github.com/sparklemotion/nokogiri/issues/1714</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html">https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html</a><br><a href="https://ubuntu.com/security/notices/USN-3504-1">https://ubuntu.com/security/notices/USN-3504-1</a><br><a href="https://ubuntu.com/security/notices/USN-3504-2">https://ubuntu.com/security/notices/USN-3504-2</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/usn/usn-3504-1/">https://usn.ubuntu.com/usn/usn-3504-1/</a><br></details> |
| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94347">http://www.securityfocus.com/bid/94347</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9318">https://access.redhat.com/security/cve/CVE-2016-9318</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=772726">https://bugzilla.gnome.org/show_bug.cgi?id=772726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318</a><br><a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://ubuntu.com/security/notices/USN-3739-2">https://ubuntu.com/security/notices/USN-3739-2</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a><br></details> |
| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a><br><a href="https://access.redhat.com/security/cve/CVE-2005-2541">https://access.redhat.com/security/cve/CVE-2005-2541</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br></details> |
| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a><br><a href="http://savannah.gnu.org/bugs/?55369">http://savannah.gnu.org/bugs/?55369</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9923">https://access.redhat.com/security/cve/CVE-2019-9923</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241">https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a><br></details> |
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20193">https://access.redhat.com/security/cve/CVE-2021-20193</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43784">https://access.redhat.com/security/cve/CVE-2021-43784</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2241">https://bugs.chromium.org/p/project-zero/issues/detail?id=2241</a><br><a href="https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554">https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554</a><br><a href="https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae">https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae</a><br><a href="https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed">https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f">https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">https://nvd.nist.gov/vuln/detail/CVE-2021-43784</a><br></details> |
| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/05/12/1">http://www.openwall.com/lists/oss-security/2022/05/12/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-24769">https://access.redhat.com/security/cve/CVE-2022-24769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769</a><br><a href="https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c">https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c</a><br><a href="https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f">https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f</a><br><a href="https://github.com/moby/moby/releases/tag/v20.10.14">https://github.com/moby/moby/releases/tag/v20.10.14</a><br><a href="https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq">https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">https://nvd.nist.gov/vuln/detail/CVE-2022-24769</a><br></details> |
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-2201.html">https://errata.almalinux.org/8/ALSA-2022-2201.html</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4">https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4</a><br><a href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5</a><br><a href="https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ">https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25032.html">https://linux.oracle.com/cve/CVE-2018-25032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-2213.html">https://linux.oracle.com/errata/ELSA-2022-2213.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">https://nvd.nist.gov/vuln/detail/CVE-2018-25032</a><br><a href="https://security.netapp.com/advisory/ntap-20220526-0009/">https://security.netapp.com/advisory/ntap-20220526-0009/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://ubuntu.com/security/notices/USN-5359-1">https://ubuntu.com/security/notices/USN-5359-1</a><br><a href="https://www.debian.org/security/2022/dsa-5111">https://www.debian.org/security/2022/dsa-5111</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-2201.html">https://errata.almalinux.org/8/ALSA-2022-2201.html</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4">https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4</a><br><a href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5</a><br><a href="https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ">https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25032.html">https://linux.oracle.com/cve/CVE-2018-25032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-2213.html">https://linux.oracle.com/errata/ELSA-2022-2213.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">https://nvd.nist.gov/vuln/detail/CVE-2018-25032</a><br><a href="https://security.netapp.com/advisory/ntap-20220526-0009/">https://security.netapp.com/advisory/ntap-20220526-0009/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://ubuntu.com/security/notices/USN-5359-1">https://ubuntu.com/security/notices/USN-5359-1</a><br><a href="https://www.debian.org/security/2022/dsa-5111">https://www.debian.org/security/2022/dsa-5111</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
#### Container: tccr.io/truecharts/mariadb:v10.7.4@sha256:03994a8d64de07be33cd0ee744dcd89eb3e0ae7138f146c33568eec910269f14 (debian 10.12)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| bash | CVE-2019-18276 | LOW | 5.0-4 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html">http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18276">https://access.redhat.com/security/cve/CVE-2019-18276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a><br><a href="https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff">https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a><br><a href="https://linux.oracle.com/cve/CVE-2019-18276.html">https://linux.oracle.com/cve/CVE-2019-18276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1679.html">https://linux.oracle.com/errata/ELSA-2021-1679.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">https://nvd.nist.gov/vuln/detail/CVE-2019-18276</a><br><a href="https://security.gentoo.org/glsa/202105-34">https://security.gentoo.org/glsa/202105-34</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0003/">https://security.netapp.com/advisory/ntap-20200430-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5380-1">https://ubuntu.com/security/notices/USN-5380-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a><br></details> |
| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| coreutils | CVE-2016-2781 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| coreutils | CVE-2017-18018 | LOW | 8.30-3 | | <details><summary>Expand...</summary><a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-18018">https://access.redhat.com/security/cve/CVE-2017-18018</a><br></details> |
| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27781">https://access.redhat.com/security/cve/CVE-2022-27781</a><br><a href="https://curl.se/docs/CVE-2022-27781.html">https://curl.se/docs/CVE-2022-27781.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781</a><br><a href="https://github.com/curl/curl/commit/f6c335d63f">https://github.com/curl/curl/commit/f6c335d63f</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27782">https://access.redhat.com/security/cve/CVE-2022-27782</a><br><a href="https://curl.se/docs/CVE-2022-27782.html">https://curl.se/docs/CVE-2022-27782.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4511.html">https://errata.almalinux.org/8/ALSA-2021-4511.html</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-14855">https://access.redhat.com/security/cve/CVE-2019-14855</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a><br><a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a><br><a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a><br><a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a><br><a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a><br><a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a><br><a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a><br></details> |
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33574">https://access.redhat.com/security/cve/CVE-2021-33574</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33574.html">https://linux.oracle.com/cve/CVE-2021-33574.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">https://nvd.nist.gov/vuln/detail/CVE-2021-33574</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a><br></details> |
| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-35942">https://access.redhat.com/security/cve/CVE-2021-35942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942</a><br><a href="https://linux.oracle.com/cve/CVE-2021-35942.html">https://linux.oracle.com/cve/CVE-2021-35942.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a><br><a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23218">https://access.redhat.com/security/cve/CVE-2022-23218</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23218.html">https://linux.oracle.com/cve/CVE-2022-23218.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">https://nvd.nist.gov/vuln/detail/CVE-2022-23218</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23219">https://access.redhat.com/security/cve/CVE-2022-23219</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23219.html">https://linux.oracle.com/cve/CVE-2022-23219.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9421.html">https://linux.oracle.com/errata/ELSA-2022-9421.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">https://nvd.nist.gov/vuln/detail/CVE-2022-23219</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br></details> |
| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1751">https://access.redhat.com/security/cve/CVE-2020-1751</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">https://nvd.nist.gov/vuln/detail/CVE-2020-1751</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-1752">https://access.redhat.com/security/cve/CVE-2020-1752</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">https://nvd.nist.gov/vuln/detail/CVE-2020-1752</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3326">https://access.redhat.com/security/cve/CVE-2021-3326</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2146">https://bugs.chromium.org/p/project-zero/issues/detail?id=2146</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">https://nvd.nist.gov/vuln/detail/CVE-2021-3326</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a><br><a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3999">https://access.redhat.com/security/cve/CVE-2021-3999</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3999.html">https://linux.oracle.com/cve/CVE-2021-3999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9234.html">https://linux.oracle.com/errata/ELSA-2022-9234.html</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-2">https://ubuntu.com/security/notices/USN-5310-2</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/4">https://www.openwall.com/lists/oss-security/2022/01/24/4</a><br></details> |
| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-25013">https://access.redhat.com/security/cve/CVE-2019-25013</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a><br><a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">https://nvd.nist.gov/vuln/detail/CVE-2019-25013</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a><br><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-10029">https://access.redhat.com/security/cve/CVE-2020-10029</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a><br><a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">https://nvd.nist.gov/vuln/detail/CVE-2020-10029</a><br><a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a><br><a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a><br><a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-27618">https://access.redhat.com/security/cve/CVE-2020-27618</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a><br><a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">https://nvd.nist.gov/vuln/detail/CVE-2020-27618</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a><br><a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a><br><a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a><br></details> |
| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a><br><a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-10228">https://access.redhat.com/security/cve/CVE-2016-10228</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a><br><a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a><br><a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a><br><a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a><br><a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a><br><a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a><br></details> |
| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a><br><a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a><br></details> |
| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a><br></details> |
| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a><br><a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a><br><a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a><br><a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a><br></details> |
| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19126">https://access.redhat.com/security/cve/CVE-2019-19126</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a><br><a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">https://nvd.nist.gov/vuln/detail/CVE-2019-19126</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a><br><a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a><br><a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a><br><a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a><br></details> |
| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a><br><a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-6096">https://access.redhat.com/security/cve/CVE-2020-6096</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">https://nvd.nist.gov/vuln/detail/CVE-2020-6096</a><br><a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a><br><a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br><a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br><a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a><br></details> |
| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27645">https://access.redhat.com/security/cve/CVE-2021-27645</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27645.html">https://linux.oracle.com/cve/CVE-2021-27645.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9560.html">https://linux.oracle.com/errata/ELSA-2021-9560.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a><br><a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a><br><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a><br><a href="https://ubuntu.com/security/notices/USN-5310-1">https://ubuntu.com/security/notices/USN-5310-1</a><br></details> |
| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br></details> |
| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27781">https://access.redhat.com/security/cve/CVE-2022-27781</a><br><a href="https://curl.se/docs/CVE-2022-27781.html">https://curl.se/docs/CVE-2022-27781.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781</a><br><a href="https://github.com/curl/curl/commit/f6c335d63f">https://github.com/curl/curl/commit/f6c335d63f</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27782">https://access.redhat.com/security/cve/CVE-2022-27782</a><br><a href="https://curl.se/docs/CVE-2022-27782.html">https://curl.se/docs/CVE-2022-27782.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4511.html">https://errata.almalinux.org/8/ALSA-2021-4511.html</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-8457">https://access.redhat.com/security/cve/CVE-2019-8457</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://linux.oracle.com/cve/CVE-2019-8457.html">https://linux.oracle.com/cve/CVE-2019-8457.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/</a><br><a href="https://security.netapp.com/advisory/ntap-20190606-0002/">https://security.netapp.com/advisory/ntap-20190606-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4004-1">https://ubuntu.com/security/notices/USN-4004-1</a><br><a href="https://ubuntu.com/security/notices/USN-4004-2">https://ubuntu.com/security/notices/USN-4004-2</a><br><a href="https://ubuntu.com/security/notices/USN-4019-1">https://ubuntu.com/security/notices/USN-4019-1</a><br><a href="https://ubuntu.com/security/notices/USN-4019-2">https://ubuntu.com/security/notices/USN-4019-2</a><br><a href="https://usn.ubuntu.com/4004-1/">https://usn.ubuntu.com/4004-1/</a><br><a href="https://usn.ubuntu.com/4004-2/">https://usn.ubuntu.com/4004-2/</a><br><a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a><br><a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a><br><a href="https://www.sqlite.org/releaselog/3_28_0.html">https://www.sqlite.org/releaselog/3_28_0.html</a><br><a href="https://www.sqlite.org/src/info/90acdbfce9c08858">https://www.sqlite.org/src/info/90acdbfce9c08858</a><br></details> |
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-33560">https://access.redhat.com/security/cve/CVE-2021-33560</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560</a><br><a href="https://dev.gnupg.org/T5305">https://dev.gnupg.org/T5305</a><br><a href="https://dev.gnupg.org/T5328">https://dev.gnupg.org/T5328</a><br><a href="https://dev.gnupg.org/T5466">https://dev.gnupg.org/T5466</a><br><a href="https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61">https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61</a><br><a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4409.html">https://errata.almalinux.org/8/ALSA-2021-4409.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33560.html">https://linux.oracle.com/cve/CVE-2021-33560.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9263.html">https://linux.oracle.com/errata/ELSA-2022-9263.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">https://nvd.nist.gov/vuln/detail/CVE-2021-33560</a><br><a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a><br><a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html</a><br><a href="http://www.openwall.com/lists/oss-security/2019/10/02/2">http://www.openwall.com/lists/oss-security/2019/10/02/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-13627">https://access.redhat.com/security/cve/CVE-2019-13627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</a><br><a href="https://dev.gnupg.org/T4683">https://dev.gnupg.org/T4683</a><br><a href="https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5">https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5</a><br><a href="https://linux.oracle.com/cve/CVE-2019-13627.html">https://linux.oracle.com/cve/CVE-2019-13627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4482.html">https://linux.oracle.com/errata/ELSA-2020-4482.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html</a><br><a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">https://security-tracker.debian.org/tracker/CVE-2019-13627</a><br><a href="https://security.gentoo.org/glsa/202003-32">https://security.gentoo.org/glsa/202003-32</a><br><a href="https://ubuntu.com/security/notices/USN-4236-1">https://ubuntu.com/security/notices/USN-4236-1</a><br><a href="https://ubuntu.com/security/notices/USN-4236-2">https://ubuntu.com/security/notices/USN-4236-2</a><br><a href="https://ubuntu.com/security/notices/USN-4236-3">https://ubuntu.com/security/notices/USN-4236-3</a><br><a href="https://usn.ubuntu.com/4236-1/">https://usn.ubuntu.com/4236-1/</a><br><a href="https://usn.ubuntu.com/4236-2/">https://usn.ubuntu.com/4236-2/</a><br><a href="https://usn.ubuntu.com/4236-3/">https://usn.ubuntu.com/4236-3/</a><br></details> |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-6829">https://access.redhat.com/security/cve/CVE-2018-6829</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a><br><a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a><br><a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a><br></details> |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-4209">https://access.redhat.com/security/cve/CVE-2021-4209</a><br></details> |
| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | | <details><summary>Expand...</summary><a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a><br><a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a><br><a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a><br><a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a><br><a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a><br><a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a><br><a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a><br><a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a><br><a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a><br><a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a><br><a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a><br><a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a><br><a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a><br><a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a><br><a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a><br><a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a><br><a href="http://osvdb.org/74829">http://osvdb.org/74829</a><br><a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a><br><a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a><br><a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a><br><a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a><br><a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a><br><a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a><br><a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a><br><a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a><br><a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a><br><a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a><br><a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a><br><a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a><br><a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a><br><a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a><br><a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a><br><a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a><br><a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a><br><a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a><br><a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a><br><a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a><br><a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a><br><a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a><br><a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a><br><a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a><br><a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a><br><a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a><br><a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a><br><a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a><br><a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a><br><a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a><br><a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a><br><a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a><br><a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a><br><a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a><br><a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a><br><a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a><br><a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a><br><a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a><br><a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a><br><a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a><br><a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a><br><a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a><br><a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-3389">https://access.redhat.com/security/cve/CVE-2011-3389</a><br><a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a><br><a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389</a><br><a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a><br><a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a><br><a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a><br><a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a><br><a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a><br><a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a><br><a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a><br></details> |
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290</a><br><a href="https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5">https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5</a><br><a href="https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de">https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de</a><br><a href="https://gitlab.com/libidn/libidn2/merge_requests/71">https://gitlab.com/libidn/libidn2/merge_requests/71</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/</a><br><a href="https://security.gentoo.org/glsa/202003-63">https://security.gentoo.org/glsa/202003-63</a><br><a href="https://ubuntu.com/security/notices/USN-4168-1">https://ubuntu.com/security/notices/USN-4168-1</a><br><a href="https://usn.ubuntu.com/4168-1/">https://usn.ubuntu.com/4168-1/</a><br></details> |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a><br><a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a><br><a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a><br><a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a><br><a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a><br><a href="https://access.redhat.com/security/cve/CVE-2004-0971">https://access.redhat.com/security/cve/CVE-2004-0971</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a><br></details> |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a><br><a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a><br><a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a><br><a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a><br><a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a><br></details> |
| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a><br><a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a><br><a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17543">https://access.redhat.com/security/cve/CVE-2019-17543</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a><br><a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a><br><a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a><br><a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a><br><a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a><br><a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11080">https://access.redhat.com/security/cve/CVE-2020-11080</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-2852.html">https://errata.almalinux.org/8/ALSA-2020-2852.html</a><br><a href="https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090">https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090</a><br><a href="https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394">https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394</a><br><a href="https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr">https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11080.html">https://linux.oracle.com/cve/CVE-2020-11080.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5765.html">https://linux.oracle.com/errata/ELSA-2020-5765.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">https://nvd.nist.gov/vuln/detail/CVE-2020-11080</a><br><a href="https://www.debian.org/security/2020/dsa-4696">https://www.debian.org/security/2020/dsa-4696</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4373.html">https://errata.almalinux.org/8/ALSA-2021-4373.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://ubuntu.com/security/notices/USN-5425-1">https://ubuntu.com/security/notices/USN-5425-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a><br><a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a><br><a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a><br><a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16231">https://access.redhat.com/security/cve/CVE-2017-16231</a><br><a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a><br></details> |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7245">https://access.redhat.com/security/cve/CVE-2017-7245</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a><br><a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-7246">https://access.redhat.com/security/cve/CVE-2017-7246</a><br><a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a><br><a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a><br></details> |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20838">https://access.redhat.com/security/cve/CVE-2019-20838</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4373.html">https://errata.almalinux.org/8/ALSA-2021-4373.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20838.html">https://linux.oracle.com/cve/CVE-2019-20838.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">https://nvd.nist.gov/vuln/detail/CVE-2019-20838</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://ubuntu.com/security/notices/USN-5425-1">https://ubuntu.com/security/notices/USN-5425-1</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html</a><br><a href="http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html">http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3624">https://access.redhat.com/errata/RHSA-2019:3624</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9893">https://access.redhat.com/security/cve/CVE-2019-9893</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893</a><br><a href="https://github.com/seccomp/libseccomp/issues/139">https://github.com/seccomp/libseccomp/issues/139</a><br><a href="https://linux.oracle.com/cve/CVE-2019-9893.html">https://linux.oracle.com/cve/CVE-2019-9893.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2019-3624.html">https://linux.oracle.com/errata/ELSA-2019-3624.html</a><br><a href="https://seclists.org/oss-sec/2019/q1/179">https://seclists.org/oss-sec/2019/q1/179</a><br><a href="https://security.gentoo.org/glsa/201904-18">https://security.gentoo.org/glsa/201904-18</a><br><a href="https://ubuntu.com/security/notices/USN-4001-1">https://ubuntu.com/security/notices/USN-4001-1</a><br><a href="https://ubuntu.com/security/notices/USN-4001-2">https://ubuntu.com/security/notices/USN-4001-2</a><br><a href="https://usn.ubuntu.com/4001-1/">https://usn.ubuntu.com/4001-1/</a><br><a href="https://usn.ubuntu.com/4001-2/">https://usn.ubuntu.com/4001-2/</a><br><a href="https://www.openwall.com/lists/oss-security/2019/03/15/1">https://www.openwall.com/lists/oss-security/2019/03/15/1</a><br></details> |
| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36084">https://access.redhat.com/security/cve/CVE-2021-36084</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3">https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36084.html">https://linux.oracle.com/cve/CVE-2021-36084.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36085">https://access.redhat.com/security/cve/CVE-2021-36085</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba">https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36085.html">https://linux.oracle.com/cve/CVE-2021-36085.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36086">https://access.redhat.com/security/cve/CVE-2021-36086</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36086.html">https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36087">https://access.redhat.com/security/cve/CVE-2021-36087</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521">https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36087.html">https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-13115">https://access.redhat.com/security/cve/CVE-2019-13115</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow/">https://blog.semmle.com/libssh2-integer-overflow/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115</a><br><a href="https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa">https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa</a><br><a href="https://github.com/libssh2/libssh2/pull/350">https://github.com/libssh2/libssh2/pull/350</a><br><a href="https://libssh2.org/changes.html">https://libssh2.org/changes.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0002/">https://security.netapp.com/advisory/ntap-20190806-0002/</a><br><a href="https://support.f5.com/csp/article/K13322484">https://support.f5.com/csp/article/K13322484</a><br><a href="https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17498">https://access.redhat.com/security/cve/CVE-2019-17498</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/">https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498</a><br><a href="https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498">https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498</a><br><a href="https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480">https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480</a><br><a href="https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c">https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c</a><br><a href="https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94">https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17498.html">https://linux.oracle.com/cve/CVE-2019-17498.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3915.html">https://linux.oracle.com/errata/ELSA-2020-3915.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">https://nvd.nist.gov/vuln/detail/CVE-2019-17498</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-1000654">https://access.redhat.com/security/cve/CVE-2018-1000654</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654</a><br><a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-5352-1">https://ubuntu.com/security/notices/USN-5352-1</a><br></details> |
| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3844">https://access.redhat.com/security/cve/CVE-2019-3844</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">https://nvd.nist.gov/vuln/detail/CVE-2019-3844</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3997">https://access.redhat.com/security/cve/CVE-2021-3997</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997</a><br><a href="https://ubuntu.com/security/notices/USN-5226-1">https://ubuntu.com/security/notices/USN-5226-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/10/2">https://www.openwall.com/lists/oss-security/2022/01/10/2</a><br></details> |
| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-20386">https://access.redhat.com/security/cve/CVE-2019-20386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a><br><a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a><br><a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">https://nvd.nist.gov/vuln/detail/CVE-2019-20386</a><br><a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13776">https://access.redhat.com/security/cve/CVE-2020-13776</a><br><a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">https://nvd.nist.gov/vuln/detail/CVE-2020-13776</a><br><a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a><br></details> |
| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u4 | | <details><summary>Expand...</summary><a href="http://xmlsoft.org/news.html">http://xmlsoft.org/news.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-16932">https://access.redhat.com/security/cve/CVE-2017-16932</a><br><a href="https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html">https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=759579">https://bugzilla.gnome.org/show_bug.cgi?id=759579</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932</a><br><a href="https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961">https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961</a><br><a href="https://github.com/sparklemotion/nokogiri/issues/1714">https://github.com/sparklemotion/nokogiri/issues/1714</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html">https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html">https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html</a><br><a href="https://ubuntu.com/security/notices/USN-3504-1">https://ubuntu.com/security/notices/USN-3504-1</a><br><a href="https://ubuntu.com/security/notices/USN-3504-2">https://ubuntu.com/security/notices/USN-3504-2</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/usn/usn-3504-1/">https://usn.ubuntu.com/usn/usn-3504-1/</a><br></details> |
| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u4 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/94347">http://www.securityfocus.com/bid/94347</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-9318">https://access.redhat.com/security/cve/CVE-2016-9318</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=772726">https://bugzilla.gnome.org/show_bug.cgi?id=772726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318</a><br><a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html</a><br><a href="https://security.gentoo.org/glsa/201711-01">https://security.gentoo.org/glsa/201711-01</a><br><a href="https://ubuntu.com/security/notices/USN-3739-1">https://ubuntu.com/security/notices/USN-3739-1</a><br><a href="https://ubuntu.com/security/notices/USN-3739-2">https://ubuntu.com/security/notices/USN-3739-2</a><br><a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a><br><a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a><br></details> |
| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |
| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a><br><a href="https://access.redhat.com/security/cve/CVE-2005-2541">https://access.redhat.com/security/cve/CVE-2005-2541</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br></details> |
| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a><br><a href="http://savannah.gnu.org/bugs/?55369">http://savannah.gnu.org/bugs/?55369</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-9923">https://access.redhat.com/security/cve/CVE-2019-9923</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241">https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a><br></details> |
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-20193">https://access.redhat.com/security/cve/CVE-2021-20193</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37600">https://access.redhat.com/security/cve/CVE-2021-37600</a><br><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43784">https://access.redhat.com/security/cve/CVE-2021-43784</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2241">https://bugs.chromium.org/p/project-zero/issues/detail?id=2241</a><br><a href="https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554">https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554</a><br><a href="https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae">https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae</a><br><a href="https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed">https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f">https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">https://nvd.nist.gov/vuln/detail/CVE-2021-43784</a><br></details> |
| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/05/12/1">http://www.openwall.com/lists/oss-security/2022/05/12/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-24769">https://access.redhat.com/security/cve/CVE-2022-24769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769</a><br><a href="https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c">https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c</a><br><a href="https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f">https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f</a><br><a href="https://github.com/moby/moby/releases/tag/v20.10.14">https://github.com/moby/moby/releases/tag/v20.10.14</a><br><a href="https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq">https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">https://nvd.nist.gov/vuln/detail/CVE-2022-24769</a><br></details> |
#### Container: tccr.io/truecharts/xbackbone:v3.3.3@sha256:c22e8806732b5a63a9761d413f4dd3a39af9427a12818e8ff769094ebc141c99 (alpine 3.9.5)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| cups-libs | CVE-2020-3898 | HIGH | 2.2.12-r0 | 2.2.12-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-3898">https://access.redhat.com/security/cve/CVE-2020-3898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898</a><br><a href="https://linux.oracle.com/cve/CVE-2020-3898.html">https://linux.oracle.com/cve/CVE-2020-3898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4469.html">https://linux.oracle.com/errata/ELSA-2020-4469.html</a><br><a href="https://support.apple.com/en-us/HT211100">https://support.apple.com/en-us/HT211100</a><br><a href="https://support.apple.com/kb/HT211100">https://support.apple.com/kb/HT211100</a><br><a href="https://ubuntu.com/security/notices/USN-4340-1">https://ubuntu.com/security/notices/USN-4340-1</a><br></details> |
| cups-libs | CVE-2019-8842 | LOW | 2.2.12-r0 | 2.2.12-r1 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT210788">https://support.apple.com/en-us/HT210788</a><br></details> |
| curl | CVE-2020-8169 | HIGH | 7.64.0-r3 | 7.64.0-r4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8169">https://access.redhat.com/security/cve/CVE-2020-8169</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.haxx.se/docs/CVE-2020-8169.html">https://curl.haxx.se/docs/CVE-2020-8169.html</a><br><a href="https://curl.se/docs/CVE-2020-8169.html">https://curl.se/docs/CVE-2020-8169.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169</a><br><a href="https://hackerone.com/reports/874778">https://hackerone.com/reports/874778</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8169">https://nvd.nist.gov/vuln/detail/CVE-2020-8169</a><br><a href="https://ubuntu.com/security/notices/USN-4402-1">https://ubuntu.com/security/notices/USN-4402-1</a><br><a href="https://www.debian.org/security/2021/dsa-4881">https://www.debian.org/security/2021/dsa-4881</a><br></details> |
| curl | CVE-2020-8177 | HIGH | 7.64.0-r3 | 7.64.0-r4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8177">https://access.redhat.com/security/cve/CVE-2020-8177</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.haxx.se/docs/CVE-2020-8177.html">https://curl.haxx.se/docs/CVE-2020-8177.html</a><br><a href="https://curl.se/docs/CVE-2020-8177.html">https://curl.se/docs/CVE-2020-8177.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177</a><br><a href="https://hackerone.com/reports/887462">https://hackerone.com/reports/887462</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8177.html">https://linux.oracle.com/cve/CVE-2020-8177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5002.html">https://linux.oracle.com/errata/ELSA-2020-5002.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">https://nvd.nist.gov/vuln/detail/CVE-2020-8177</a><br><a href="https://ubuntu.com/security/notices/USN-4402-1">https://ubuntu.com/security/notices/USN-4402-1</a><br><a href="https://www.debian.org/security/2021/dsa-4881">https://www.debian.org/security/2021/dsa-4881</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| curl | CVE-2020-8231 | HIGH | 7.64.0-r3 | 7.66.0-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8231">https://access.redhat.com/security/cve/CVE-2020-8231</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.haxx.se/docs/CVE-2020-8231.html">https://curl.haxx.se/docs/CVE-2020-8231.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231</a><br><a href="https://hackerone.com/reports/948876">https://hackerone.com/reports/948876</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8231.html">https://linux.oracle.com/cve/CVE-2020-8231.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1610.html">https://linux.oracle.com/errata/ELSA-2021-1610.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">https://nvd.nist.gov/vuln/detail/CVE-2020-8231</a><br><a href="https://security.gentoo.org/glsa/202012-14">https://security.gentoo.org/glsa/202012-14</a><br><a href="https://ubuntu.com/security/notices/USN-4466-1">https://ubuntu.com/security/notices/USN-4466-1</a><br><a href="https://ubuntu.com/security/notices/USN-4466-2">https://ubuntu.com/security/notices/USN-4466-2</a><br><a href="https://ubuntu.com/security/notices/USN-4665-1">https://ubuntu.com/security/notices/USN-4665-1</a><br><a href="https://www.debian.org/security/2021/dsa-4881">https://www.debian.org/security/2021/dsa-4881</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| dbus-libs | CVE-2020-12049 | MEDIUM | 1.10.28-r0 | 1.12.28-r1 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/06/04/3">http://www.openwall.com/lists/oss-security/2020/06/04/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-12049">https://access.redhat.com/security/cve/CVE-2020-12049</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/issues/294">https://gitlab.freedesktop.org/dbus/dbus/-/issues/294</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30">https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18">https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18</a><br><a href="https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16">https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12049.html">https://linux.oracle.com/cve/CVE-2020-12049.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3014.html">https://linux.oracle.com/errata/ELSA-2020-3014.html</a><br><a href="https://security.gentoo.org/glsa/202007-46">https://security.gentoo.org/glsa/202007-46</a><br><a href="https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak">https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak</a><br><a href="https://ubuntu.com/security/notices/USN-4398-1">https://ubuntu.com/security/notices/USN-4398-1</a><br><a href="https://ubuntu.com/security/notices/USN-4398-2">https://ubuntu.com/security/notices/USN-4398-2</a><br><a href="https://usn.ubuntu.com/4398-1/">https://usn.ubuntu.com/4398-1/</a><br><a href="https://usn.ubuntu.com/4398-2/">https://usn.ubuntu.com/4398-2/</a><br></details> |
| freetype | CVE-2020-15999 | MEDIUM | 2.9.1-r2 | 2.9.1-r3 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html">http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html</a><br><a href="http://seclists.org/fulldisclosure/2020/Nov/33">http://seclists.org/fulldisclosure/2020/Nov/33</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15999">https://access.redhat.com/security/cve/CVE-2020-15999</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2103">https://bugs.chromium.org/p/project-zero/issues/detail?id=2103</a><br><a href="https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html">https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html</a><br><a href="https://crbug.com/1139963">https://crbug.com/1139963</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-4952.html">https://errata.almalinux.org/8/ALSA-2020-4952.html</a><br><a href="https://github.com/advisories/GHSA-pv36-h7jh-qm62">https://github.com/advisories/GHSA-pv36-h7jh-qm62</a><br><a href="https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62">https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62</a><br><a href="https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html">https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-15999.html">https://linux.oracle.com/cve/CVE-2020-15999.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4952.html">https://linux.oracle.com/errata/ELSA-2020-4952.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">https://nvd.nist.gov/vuln/detail/CVE-2020-15999</a><br><a href="https://security.gentoo.org/glsa/202011-12">https://security.gentoo.org/glsa/202011-12</a><br><a href="https://security.gentoo.org/glsa/202012-04">https://security.gentoo.org/glsa/202012-04</a><br><a href="https://ubuntu.com/security/notices/USN-4593-1">https://ubuntu.com/security/notices/USN-4593-1</a><br><a href="https://ubuntu.com/security/notices/USN-4593-2">https://ubuntu.com/security/notices/USN-4593-2</a><br><a href="https://www.debian.org/security/2021/dsa-4824">https://www.debian.org/security/2021/dsa-4824</a><br><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2020-52/#CVE-2020-15999">https://www.mozilla.org/en-US/security/advisories/mfsa2020-52/#CVE-2020-15999</a><br><a href="https://www.nuget.org/packages/CefSharp.Common/">https://www.nuget.org/packages/CefSharp.Common/</a><br><a href="https://www.nuget.org/packages/CefSharp.WinForms">https://www.nuget.org/packages/CefSharp.WinForms</a><br><a href="https://www.nuget.org/packages/CefSharp.Wpf">https://www.nuget.org/packages/CefSharp.Wpf</a><br><a href="https://www.nuget.org/packages/CefSharp.Wpf.HwndHost">https://www.nuget.org/packages/CefSharp.Wpf.HwndHost</a><br></details> |
| git | CVE-2020-11008 | HIGH | 2.20.2-r0 | 2.20.4-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="http://seclists.org/fulldisclosure/2020/May/41">http://seclists.org/fulldisclosure/2020/May/41</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11008">https://access.redhat.com/security/cve/CVE-2020-11008</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008</a><br><a href="https://github.com/git/git/commit/c44088ecc4b0722636e0a305f9608d3047197282">https://github.com/git/git/commit/c44088ecc4b0722636e0a305f9608d3047197282</a><br><a href="https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7">https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7</a><br><a href="https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q">https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11008.html">https://linux.oracle.com/cve/CVE-2020-11008.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-2337.html">https://linux.oracle.com/errata/ELSA-2020-2337.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00015.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/</a><br><a href="https://lore.kernel.org/git/xmqq4kterq5s.fsf@gitster.c.googlers.com/">https://lore.kernel.org/git/xmqq4kterq5s.fsf@gitster.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202004-13">https://security.gentoo.org/glsa/202004-13</a><br><a href="https://support.apple.com/kb/HT211183">https://support.apple.com/kb/HT211183</a><br><a href="https://ubuntu.com/security/notices/USN-4334-1">https://ubuntu.com/security/notices/USN-4334-1</a><br><a href="https://usn.ubuntu.com/4334-1/">https://usn.ubuntu.com/4334-1/</a><br></details> |
| git | CVE-2020-5260 | HIGH | 2.20.2-r0 | 2.20.3-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a><br><a href="http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html">http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html</a><br><a href="http://www.openwall.com/lists/oss-security/2020/04/15/5">http://www.openwall.com/lists/oss-security/2020/04/15/5</a><br><a href="http://www.openwall.com/lists/oss-security/2020/04/15/6">http://www.openwall.com/lists/oss-security/2020/04/15/6</a><br><a href="http://www.openwall.com/lists/oss-security/2020/04/20/1">http://www.openwall.com/lists/oss-security/2020/04/20/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-5260">https://access.redhat.com/security/cve/CVE-2020-5260</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260</a><br><a href="https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b">https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b</a><br><a href="https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q">https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q</a><br><a href="https://linux.oracle.com/cve/CVE-2020-5260.html">https://linux.oracle.com/cve/CVE-2020-5260.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1513.html">https://linux.oracle.com/errata/ELSA-2020-1513.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7TVS5UG6JD3MYIGSBKMIOS6AF7CR5IPI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7TVS5UG6JD3MYIGSBKMIOS6AF7CR5IPI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/</a><br><a href="https://lore.kernel.org/git/xmqqy2qy7xn8.fsf@gitster.c.googlers.com/">https://lore.kernel.org/git/xmqqy2qy7xn8.fsf@gitster.c.googlers.com/</a><br><a href="https://security.gentoo.org/glsa/202004-13">https://security.gentoo.org/glsa/202004-13</a><br><a href="https://support.apple.com/kb/HT211141">https://support.apple.com/kb/HT211141</a><br><a href="https://ubuntu.com/security/notices/USN-4329-1">https://ubuntu.com/security/notices/USN-4329-1</a><br><a href="https://usn.ubuntu.com/4329-1/">https://usn.ubuntu.com/4329-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4657">https://www.debian.org/security/2020/dsa-4657</a><br></details> |
| gnutls | CVE-2020-13777 | HIGH | 3.6.7-r1 | 3.6.14-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00015.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13777">https://access.redhat.com/security/cve/CVE-2020-13777</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777</a><br><a href="https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03">https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13777.html">https://linux.oracle.com/cve/CVE-2020-13777.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-2637.html">https://linux.oracle.com/errata/ELSA-2020-2637.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6C4DHUKV6M6SJ5CV6KVHZNHNF7HCUE5P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6C4DHUKV6M6SJ5CV6KVHZNHNF7HCUE5P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RTXZOXC4MHTFE2HKY6IAZMF2WHD2WMV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RTXZOXC4MHTFE2HKY6IAZMF2WHD2WMV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRQBFK3UZ7SV76IYDTS4PS6ABS2DSJHK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRQBFK3UZ7SV76IYDTS4PS6ABS2DSJHK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMB3UGI5H5RCFRU6OGRPMNUCNLJGEN7Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMB3UGI5H5RCFRU6OGRPMNUCNLJGEN7Y/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13777">https://nvd.nist.gov/vuln/detail/CVE-2020-13777</a><br><a href="https://security.gentoo.org/glsa/202006-01">https://security.gentoo.org/glsa/202006-01</a><br><a href="https://security.netapp.com/advisory/ntap-20200619-0004/">https://security.netapp.com/advisory/ntap-20200619-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4384-1">https://ubuntu.com/security/notices/USN-4384-1</a><br><a href="https://usn.ubuntu.com/4384-1/">https://usn.ubuntu.com/4384-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4697">https://www.debian.org/security/2020/dsa-4697</a><br><a href="https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-06-03">https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-06-03</a><br></details> |
| gnutls | CVE-2020-24659 | HIGH | 3.6.7-r1 | 3.6.15-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-24659">https://access.redhat.com/security/cve/CVE-2020-24659</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659</a><br><a href="https://gitlab.com/gnutls/gnutls/-/issues/1071">https://gitlab.com/gnutls/gnutls/-/issues/1071</a><br><a href="https://linux.oracle.com/cve/CVE-2020-24659.html">https://linux.oracle.com/cve/CVE-2020-24659.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5483.html">https://linux.oracle.com/errata/ELSA-2020-5483.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62BUAI4FQQLG6VTKRT7SUZPGJJ4NASQ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62BUAI4FQQLG6VTKRT7SUZPGJJ4NASQ3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWN56FDLQQXT2D2YHNI4TYH432TDMQ7N/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWN56FDLQQXT2D2YHNI4TYH432TDMQ7N/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">https://nvd.nist.gov/vuln/detail/CVE-2020-24659</a><br><a href="https://security.gentoo.org/glsa/202009-01">https://security.gentoo.org/glsa/202009-01</a><br><a href="https://security.netapp.com/advisory/ntap-20200911-0006/">https://security.netapp.com/advisory/ntap-20200911-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4491-1">https://ubuntu.com/security/notices/USN-4491-1</a><br><a href="https://usn.ubuntu.com/4491-1/">https://usn.ubuntu.com/4491-1/</a><br><a href="https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-09-04">https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-09-04</a><br></details> |
| jbig2dec | CVE-2020-12268 | CRITICAL | 0.15-r0 | 0.15-r1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-12268">https://access.redhat.com/security/cve/CVE-2020-12268</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12268">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12268</a><br><a href="https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e">https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e</a><br><a href="https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18">https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12268.html">https://linux.oracle.com/cve/CVE-2020-12268.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-2897.html">https://linux.oracle.com/errata/ELSA-2020-2897.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html</a><br><a href="https://ubuntu.com/security/notices/USN-5405-1">https://ubuntu.com/security/notices/USN-5405-1</a><br></details> |
| libcrypto1.1 | CVE-2020-1967 | HIGH | 1.1.1d-r2 | 1.1.1g-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html</a><br><a href="http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html">http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html</a><br><a href="http://seclists.org/fulldisclosure/2020/May/5">http://seclists.org/fulldisclosure/2020/May/5</a><br><a href="http://www.openwall.com/lists/oss-security/2020/04/22/2">http://www.openwall.com/lists/oss-security/2020/04/22/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-1967">https://access.redhat.com/security/cve/CVE-2020-1967</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1</a><br><a href="https://github.com/irsl/CVE-2020-1967">https://github.com/irsl/CVE-2020-1967</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440</a><br><a href="https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">https://nvd.nist.gov/vuln/detail/CVE-2020-1967</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2020-0015.html">https://rustsec.org/advisories/RUSTSEC-2020-0015.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202004-10">https://security.gentoo.org/glsa/202004-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200424-0003/">https://security.netapp.com/advisory/ntap-20200424-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20200717-0004/">https://security.netapp.com/advisory/ntap-20200717-0004/</a><br><a href="https://www.debian.org/security/2020/dsa-4661">https://www.debian.org/security/2020/dsa-4661</a><br><a href="https://www.openssl.org/news/secadv/20200421.txt">https://www.openssl.org/news/secadv/20200421.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_20_05">https://www.synology.com/security/advisory/Synology_SA_20_05</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL">https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL</a><br><a href="https://www.tenable.com/security/tns-2020-03">https://www.tenable.com/security/tns-2020-03</a><br><a href="https://www.tenable.com/security/tns-2020-04">https://www.tenable.com/security/tns-2020-04</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libcrypto1.1 | CVE-2021-23840 | HIGH | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libcrypto1.1 | CVE-2021-3450 | HIGH | 1.1.1d-r2 | 1.1.1k-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/27/1">http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/27/2">http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/3">http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/4">http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3450">https://access.redhat.com/security/cve/CVE-2021-3450</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3450.html">https://linux.oracle.com/cve/CVE-2021-3450.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9151.html">https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href="https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html">https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">https://nvd.nist.gov/vuln/detail/CVE-2021-3450</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0056.html">https://rustsec.org/advisories/RUSTSEC-2021-0056.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0006/">https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href="https://www.openssl.org/news/secadv/20210325.txt">https://www.openssl.org/news/secadv/20210325.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-05">https://www.tenable.com/security/tns-2021-05</a><br><a href="https://www.tenable.com/security/tns-2021-08">https://www.tenable.com/security/tns-2021-08</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libcrypto1.1 | CVE-2020-1971 | MEDIUM | 1.1.1d-r2 | 1.1.1i-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/09/14/2">http://www.openwall.com/lists/oss-security/2021/09/14/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-1971">https://access.redhat.com/security/cve/CVE-2020-1971</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1971.html">https://linux.oracle.com/cve/CVE-2020-1971.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9150.html">https://linux.oracle.com/errata/ELSA-2021-9150.html</a><br><a href="https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E">https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">https://nvd.nist.gov/vuln/detail/CVE-2020-1971</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202012-13">https://security.gentoo.org/glsa/202012-13</a><br><a href="https://security.netapp.com/advisory/ntap-20201218-0005/">https://security.netapp.com/advisory/ntap-20201218-0005/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4662-1">https://ubuntu.com/security/notices/USN-4662-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2020/dsa-4807">https://www.debian.org/security/2020/dsa-4807</a><br><a href="https://www.openssl.org/news/secadv/20201208.txt">https://www.openssl.org/news/secadv/20201208.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libcrypto1.1 | CVE-2021-23841 | MEDIUM | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libcrypto1.1 | CVE-2021-3449 | MEDIUM | 1.1.1d-r2 | 1.1.1k-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/27/1">http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/27/2">http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/3">http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/4">http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3449">https://access.redhat.com/security/cve/CVE-2021-3449</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3449.html">https://linux.oracle.com/cve/CVE-2021-3449.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9151.html">https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0055.html">https://rustsec.org/advisories/RUSTSEC-2021-0055.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0006/">https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href="https://ubuntu.com/security/notices/USN-4891-1">https://ubuntu.com/security/notices/USN-4891-1</a><br><a href="https://ubuntu.com/security/notices/USN-5038-1">https://ubuntu.com/security/notices/USN-5038-1</a><br><a href="https://www.debian.org/security/2021/dsa-4875">https://www.debian.org/security/2021/dsa-4875</a><br><a href="https://www.openssl.org/news/secadv/20210325.txt">https://www.openssl.org/news/secadv/20210325.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-05">https://www.tenable.com/security/tns-2021-05</a><br><a href="https://www.tenable.com/security/tns-2021-06">https://www.tenable.com/security/tns-2021-06</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libcrypto1.1 | CVE-2021-23839 | LOW | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23839">https://access.redhat.com/security/cve/CVE-2021-23839</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libcurl | CVE-2020-8169 | HIGH | 7.64.0-r3 | 7.64.0-r4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8169">https://access.redhat.com/security/cve/CVE-2020-8169</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.haxx.se/docs/CVE-2020-8169.html">https://curl.haxx.se/docs/CVE-2020-8169.html</a><br><a href="https://curl.se/docs/CVE-2020-8169.html">https://curl.se/docs/CVE-2020-8169.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169</a><br><a href="https://hackerone.com/reports/874778">https://hackerone.com/reports/874778</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8169">https://nvd.nist.gov/vuln/detail/CVE-2020-8169</a><br><a href="https://ubuntu.com/security/notices/USN-4402-1">https://ubuntu.com/security/notices/USN-4402-1</a><br><a href="https://www.debian.org/security/2021/dsa-4881">https://www.debian.org/security/2021/dsa-4881</a><br></details> |
| libcurl | CVE-2020-8177 | HIGH | 7.64.0-r3 | 7.64.0-r4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8177">https://access.redhat.com/security/cve/CVE-2020-8177</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.haxx.se/docs/CVE-2020-8177.html">https://curl.haxx.se/docs/CVE-2020-8177.html</a><br><a href="https://curl.se/docs/CVE-2020-8177.html">https://curl.se/docs/CVE-2020-8177.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177</a><br><a href="https://hackerone.com/reports/887462">https://hackerone.com/reports/887462</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8177.html">https://linux.oracle.com/cve/CVE-2020-8177.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5002.html">https://linux.oracle.com/errata/ELSA-2020-5002.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">https://nvd.nist.gov/vuln/detail/CVE-2020-8177</a><br><a href="https://ubuntu.com/security/notices/USN-4402-1">https://ubuntu.com/security/notices/USN-4402-1</a><br><a href="https://www.debian.org/security/2021/dsa-4881">https://www.debian.org/security/2021/dsa-4881</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
| libcurl | CVE-2020-8231 | HIGH | 7.64.0-r3 | 7.66.0-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8231">https://access.redhat.com/security/cve/CVE-2020-8231</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.haxx.se/docs/CVE-2020-8231.html">https://curl.haxx.se/docs/CVE-2020-8231.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231</a><br><a href="https://hackerone.com/reports/948876">https://hackerone.com/reports/948876</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8231.html">https://linux.oracle.com/cve/CVE-2020-8231.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1610.html">https://linux.oracle.com/errata/ELSA-2021-1610.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">https://nvd.nist.gov/vuln/detail/CVE-2020-8231</a><br><a href="https://security.gentoo.org/glsa/202012-14">https://security.gentoo.org/glsa/202012-14</a><br><a href="https://ubuntu.com/security/notices/USN-4466-1">https://ubuntu.com/security/notices/USN-4466-1</a><br><a href="https://ubuntu.com/security/notices/USN-4466-2">https://ubuntu.com/security/notices/USN-4466-2</a><br><a href="https://ubuntu.com/security/notices/USN-4665-1">https://ubuntu.com/security/notices/USN-4665-1</a><br><a href="https://www.debian.org/security/2021/dsa-4881">https://www.debian.org/security/2021/dsa-4881</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| libldap | CVE-2020-12243 | HIGH | 2.4.48-r0 | 2.4.48-r1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-12243">https://access.redhat.com/security/cve/CVE-2020-12243</a><br><a href="https://bugs.openldap.org/show_bug.cgi?id=9202">https://bugs.openldap.org/show_bug.cgi?id=9202</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243</a><br><a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES">https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440">https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12243.html">https://linux.oracle.com/cve/CVE-2020-12243.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4041.html">https://linux.oracle.com/errata/ELSA-2020-4041.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html</a><br><a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/">https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/</a><br><a href="https://security.netapp.com/advisory/ntap-20200511-0003/">https://security.netapp.com/advisory/ntap-20200511-0003/</a><br><a href="https://support.apple.com/kb/HT211289">https://support.apple.com/kb/HT211289</a><br><a href="https://ubuntu.com/security/notices/USN-4352-1">https://ubuntu.com/security/notices/USN-4352-1</a><br><a href="https://ubuntu.com/security/notices/USN-4352-2">https://ubuntu.com/security/notices/USN-4352-2</a><br><a href="https://usn.ubuntu.com/4352-1/">https://usn.ubuntu.com/4352-1/</a><br><a href="https://usn.ubuntu.com/4352-2/">https://usn.ubuntu.com/4352-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4666">https://www.debian.org/security/2020/dsa-4666</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| libldap | CVE-2020-25692 | HIGH | 2.4.48-r0 | 2.4.48-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25692">https://access.redhat.com/security/cve/CVE-2020-25692</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894567">https://bugzilla.redhat.com/show_bug.cgi?id=1894567</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25692.html">https://linux.oracle.com/cve/CVE-2020-25692.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1389.html">https://linux.oracle.com/errata/ELSA-2021-1389.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">https://nvd.nist.gov/vuln/detail/CVE-2020-25692</a><br><a href="https://security.netapp.com/advisory/ntap-20210108-0006/">https://security.netapp.com/advisory/ntap-20210108-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4622-1">https://ubuntu.com/security/notices/USN-4622-1</a><br><a href="https://ubuntu.com/security/notices/USN-4622-2">https://ubuntu.com/security/notices/USN-4622-2</a><br></details> |
| libldap | CVE-2020-25709 | HIGH | 2.4.48-r0 | 2.4.48-r2 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-25709">https://access.redhat.com/security/cve/CVE-2020-25709</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1899675">https://bugzilla.redhat.com/show_bug.cgi?id=1899675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c">https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25709.html">https://linux.oracle.com/cve/CVE-2020-25709.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0621.html">https://linux.oracle.com/errata/ELSA-2022-0621.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210716-0003/">https://security.netapp.com/advisory/ntap-20210716-0003/</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://ubuntu.com/security/notices/USN-4634-1">https://ubuntu.com/security/notices/USN-4634-1</a><br><a href="https://ubuntu.com/security/notices/USN-4634-2">https://ubuntu.com/security/notices/USN-4634-2</a><br><a href="https://www.debian.org/security/2020/dsa-4792">https://www.debian.org/security/2020/dsa-4792</a><br></details> |
| libldap | CVE-2020-25710 | HIGH | 2.4.48-r0 | 2.4.48-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25710">https://access.redhat.com/security/cve/CVE-2020-25710</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1899678">https://bugzilla.redhat.com/show_bug.cgi?id=1899678</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710</a><br><a href="https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c">https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25710.html">https://linux.oracle.com/cve/CVE-2020-25710.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0621.html">https://linux.oracle.com/errata/ELSA-2022-0621.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210716-0003/">https://security.netapp.com/advisory/ntap-20210716-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4634-1">https://ubuntu.com/security/notices/USN-4634-1</a><br><a href="https://ubuntu.com/security/notices/USN-4634-2">https://ubuntu.com/security/notices/USN-4634-2</a><br><a href="https://www.debian.org/security/2020/dsa-4792">https://www.debian.org/security/2020/dsa-4792</a><br></details> |
| libpq | CVE-2020-14349 | HIGH | 11.7-r0 | 11.9-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14349">https://access.redhat.com/security/cve/CVE-2020-14349</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1865744">https://bugzilla.redhat.com/show_bug.cgi?id=1865744</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-5620.html">https://errata.almalinux.org/8/ALSA-2020-5620.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14349.html">https://linux.oracle.com/cve/CVE-2020-14349.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9290.html">https://linux.oracle.com/errata/ELSA-2021-9290.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">https://nvd.nist.gov/vuln/detail/CVE-2020-14349</a><br><a href="https://security.gentoo.org/glsa/202008-13">https://security.gentoo.org/glsa/202008-13</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0002/">https://security.netapp.com/advisory/ntap-20200918-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4472-1">https://ubuntu.com/security/notices/USN-4472-1</a><br><a href="https://usn.ubuntu.com/4472-1/">https://usn.ubuntu.com/4472-1/</a><br><a href="https://www.postgresql.org/about/news/2060/">https://www.postgresql.org/about/news/2060/</a><br></details> |
| libpq | CVE-2020-14350 | HIGH | 11.7-r0 | 11.9-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14350">https://access.redhat.com/security/cve/CVE-2020-14350</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1865746">https://bugzilla.redhat.com/show_bug.cgi?id=1865746</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-5620.html">https://errata.almalinux.org/8/ALSA-2020-5620.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14350.html">https://linux.oracle.com/cve/CVE-2020-14350.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9290.html">https://linux.oracle.com/errata/ELSA-2021-9290.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/08/msg00028.html">https://lists.debian.org/debian-lts-announce/2020/08/msg00028.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">https://nvd.nist.gov/vuln/detail/CVE-2020-14350</a><br><a href="https://security.gentoo.org/glsa/202008-13">https://security.gentoo.org/glsa/202008-13</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0002/">https://security.netapp.com/advisory/ntap-20200918-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4472-1">https://ubuntu.com/security/notices/USN-4472-1</a><br><a href="https://usn.ubuntu.com/4472-1/">https://usn.ubuntu.com/4472-1/</a><br><a href="https://www.postgresql.org/about/news/2060/">https://www.postgresql.org/about/news/2060/</a><br></details> |
| libpq | CVE-2020-25694 | HIGH | 11.7-r0 | 11.10-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25694">https://access.redhat.com/security/cve/CVE-2020-25694</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894423">https://bugzilla.redhat.com/show_bug.cgi?id=1894423</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-5620.html">https://errata.almalinux.org/8/ALSA-2020-5620.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25694.html">https://linux.oracle.com/cve/CVE-2020-25694.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9290.html">https://linux.oracle.com/errata/ELSA-2021-9290.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">https://nvd.nist.gov/vuln/detail/CVE-2020-25694</a><br><a href="https://security.gentoo.org/glsa/202012-07">https://security.gentoo.org/glsa/202012-07</a><br><a href="https://security.netapp.com/advisory/ntap-20201202-0003/">https://security.netapp.com/advisory/ntap-20201202-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-4633-1">https://ubuntu.com/security/notices/USN-4633-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/">https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/</a><br><a href="https://www.postgresql.org/support/security/">https://www.postgresql.org/support/security/</a><br></details> |
| libpq | CVE-2020-25695 | HIGH | 11.7-r0 | 11.10-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25695">https://access.redhat.com/security/cve/CVE-2020-25695</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894425">https://bugzilla.redhat.com/show_bug.cgi?id=1894425</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-5620.html">https://errata.almalinux.org/8/ALSA-2020-5620.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25695.html">https://linux.oracle.com/cve/CVE-2020-25695.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9290.html">https://linux.oracle.com/errata/ELSA-2021-9290.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">https://nvd.nist.gov/vuln/detail/CVE-2020-25695</a><br><a href="https://security.gentoo.org/glsa/202012-07">https://security.gentoo.org/glsa/202012-07</a><br><a href="https://security.netapp.com/advisory/ntap-20201202-0003/">https://security.netapp.com/advisory/ntap-20201202-0003/</a><br><a href="https://staaldraad.github.io/post/2020-12-15-cve-2020-25695-postgresql-privesc/">https://staaldraad.github.io/post/2020-12-15-cve-2020-25695-postgresql-privesc/</a><br><a href="https://ubuntu.com/security/notices/USN-4633-1">https://ubuntu.com/security/notices/USN-4633-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/">https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/</a><br><a href="https://www.postgresql.org/support/security/">https://www.postgresql.org/support/security/</a><br></details> |
| libpq | CVE-2020-25696 | HIGH | 11.7-r0 | 11.10-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-25696">https://access.redhat.com/security/cve/CVE-2020-25696</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1894430">https://bugzilla.redhat.com/show_bug.cgi?id=1894430</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-5620.html">https://errata.almalinux.org/8/ALSA-2020-5620.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-25696.html">https://linux.oracle.com/cve/CVE-2020-25696.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9290.html">https://linux.oracle.com/errata/ELSA-2021-9290.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">https://nvd.nist.gov/vuln/detail/CVE-2020-25696</a><br><a href="https://security.gentoo.org/glsa/202012-07">https://security.gentoo.org/glsa/202012-07</a><br><a href="https://ubuntu.com/security/notices/USN-4633-1">https://ubuntu.com/security/notices/USN-4633-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/">https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/</a><br></details> |
| libpq | CVE-2021-3393 | MEDIUM | 11.7-r0 | 11.11-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3393">https://access.redhat.com/security/cve/CVE-2021-3393</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1924005">https://bugzilla.redhat.com/show_bug.cgi?id=1924005</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-2372.html">https://errata.almalinux.org/8/ALSA-2021-2372.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3393.html">https://linux.oracle.com/cve/CVE-2021-3393.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2372.html">https://linux.oracle.com/errata/ELSA-2021-2372.html</a><br><a href="https://security.gentoo.org/glsa/202105-32">https://security.gentoo.org/glsa/202105-32</a><br><a href="https://security.netapp.com/advisory/ntap-20210507-0006/">https://security.netapp.com/advisory/ntap-20210507-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4735-1">https://ubuntu.com/security/notices/USN-4735-1</a><br><a href="https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/">https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/</a><br><a href="https://www.postgresql.org/support/security/CVE-2021-3393/">https://www.postgresql.org/support/security/CVE-2021-3393/</a><br></details> |
| libssl1.1 | CVE-2020-1967 | HIGH | 1.1.1d-r2 | 1.1.1g-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html</a><br><a href="http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html">http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html</a><br><a href="http://seclists.org/fulldisclosure/2020/May/5">http://seclists.org/fulldisclosure/2020/May/5</a><br><a href="http://www.openwall.com/lists/oss-security/2020/04/22/2">http://www.openwall.com/lists/oss-security/2020/04/22/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-1967">https://access.redhat.com/security/cve/CVE-2020-1967</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1</a><br><a href="https://github.com/irsl/CVE-2020-1967">https://github.com/irsl/CVE-2020-1967</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440</a><br><a href="https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">https://nvd.nist.gov/vuln/detail/CVE-2020-1967</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2020-0015.html">https://rustsec.org/advisories/RUSTSEC-2020-0015.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202004-10">https://security.gentoo.org/glsa/202004-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200424-0003/">https://security.netapp.com/advisory/ntap-20200424-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20200717-0004/">https://security.netapp.com/advisory/ntap-20200717-0004/</a><br><a href="https://www.debian.org/security/2020/dsa-4661">https://www.debian.org/security/2020/dsa-4661</a><br><a href="https://www.openssl.org/news/secadv/20200421.txt">https://www.openssl.org/news/secadv/20200421.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_20_05">https://www.synology.com/security/advisory/Synology_SA_20_05</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL">https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL</a><br><a href="https://www.tenable.com/security/tns-2020-03">https://www.tenable.com/security/tns-2020-03</a><br><a href="https://www.tenable.com/security/tns-2020-04">https://www.tenable.com/security/tns-2020-04</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.1 | CVE-2021-23840 | HIGH | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.1 | CVE-2021-3450 | HIGH | 1.1.1d-r2 | 1.1.1k-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/27/1">http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/27/2">http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/3">http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/4">http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3450">https://access.redhat.com/security/cve/CVE-2021-3450</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3450.html">https://linux.oracle.com/cve/CVE-2021-3450.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9151.html">https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href="https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html">https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">https://nvd.nist.gov/vuln/detail/CVE-2021-3450</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0056.html">https://rustsec.org/advisories/RUSTSEC-2021-0056.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0006/">https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href="https://www.openssl.org/news/secadv/20210325.txt">https://www.openssl.org/news/secadv/20210325.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-05">https://www.tenable.com/security/tns-2021-05</a><br><a href="https://www.tenable.com/security/tns-2021-08">https://www.tenable.com/security/tns-2021-08</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libssl1.1 | CVE-2020-1971 | MEDIUM | 1.1.1d-r2 | 1.1.1i-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/09/14/2">http://www.openwall.com/lists/oss-security/2021/09/14/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-1971">https://access.redhat.com/security/cve/CVE-2020-1971</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1971.html">https://linux.oracle.com/cve/CVE-2020-1971.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9150.html">https://linux.oracle.com/errata/ELSA-2021-9150.html</a><br><a href="https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E">https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">https://nvd.nist.gov/vuln/detail/CVE-2020-1971</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202012-13">https://security.gentoo.org/glsa/202012-13</a><br><a href="https://security.netapp.com/advisory/ntap-20201218-0005/">https://security.netapp.com/advisory/ntap-20201218-0005/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4662-1">https://ubuntu.com/security/notices/USN-4662-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2020/dsa-4807">https://www.debian.org/security/2020/dsa-4807</a><br><a href="https://www.openssl.org/news/secadv/20201208.txt">https://www.openssl.org/news/secadv/20201208.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.1 | CVE-2021-23841 | MEDIUM | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| libssl1.1 | CVE-2021-3449 | MEDIUM | 1.1.1d-r2 | 1.1.1k-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/27/1">http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/27/2">http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/3">http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/4">http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3449">https://access.redhat.com/security/cve/CVE-2021-3449</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3449.html">https://linux.oracle.com/cve/CVE-2021-3449.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9151.html">https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0055.html">https://rustsec.org/advisories/RUSTSEC-2021-0055.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0006/">https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href="https://ubuntu.com/security/notices/USN-4891-1">https://ubuntu.com/security/notices/USN-4891-1</a><br><a href="https://ubuntu.com/security/notices/USN-5038-1">https://ubuntu.com/security/notices/USN-5038-1</a><br><a href="https://www.debian.org/security/2021/dsa-4875">https://www.debian.org/security/2021/dsa-4875</a><br><a href="https://www.openssl.org/news/secadv/20210325.txt">https://www.openssl.org/news/secadv/20210325.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-05">https://www.tenable.com/security/tns-2021-05</a><br><a href="https://www.tenable.com/security/tns-2021-06">https://www.tenable.com/security/tns-2021-06</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| libssl1.1 | CVE-2021-23839 | LOW | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23839">https://access.redhat.com/security/cve/CVE-2021-23839</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libx11 | CVE-2020-14363 | HIGH | 1.6.7-r0 | 1.6.12-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-14363">https://access.redhat.com/security/cve/CVE-2020-14363</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363</a><br><a href="https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt">https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt</a><br><a href="https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh">https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14363.html">https://linux.oracle.com/cve/CVE-2020-14363.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1804.html">https://linux.oracle.com/errata/ELSA-2021-1804.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/</a><br><a href="https://lists.x.org/archives/xorg-announce/2020-August/003056.html">https://lists.x.org/archives/xorg-announce/2020-August/003056.html</a><br><a href="https://ubuntu.com/security/notices/USN-4487-1">https://ubuntu.com/security/notices/USN-4487-1</a><br><a href="https://ubuntu.com/security/notices/USN-4487-2">https://ubuntu.com/security/notices/USN-4487-2</a><br><a href="https://usn.ubuntu.com/4487-2/">https://usn.ubuntu.com/4487-2/</a><br></details> |
| libx11 | CVE-2020-14344 | MEDIUM | 1.6.7-r0 | 1.6.10-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14344">https://access.redhat.com/security/cve/CVE-2020-14344</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14344.html">https://linux.oracle.com/cve/CVE-2020-14344.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1804.html">https://linux.oracle.com/errata/ELSA-2021-1804.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/</a><br><a href="https://lists.x.org/archives/xorg-announce/2020-July/003050.html">https://lists.x.org/archives/xorg-announce/2020-July/003050.html</a><br><a href="https://security.gentoo.org/glsa/202008-18">https://security.gentoo.org/glsa/202008-18</a><br><a href="https://ubuntu.com/security/notices/USN-4487-1">https://ubuntu.com/security/notices/USN-4487-1</a><br><a href="https://ubuntu.com/security/notices/USN-4487-2">https://ubuntu.com/security/notices/USN-4487-2</a><br><a href="https://usn.ubuntu.com/4487-1/">https://usn.ubuntu.com/4487-1/</a><br><a href="https://usn.ubuntu.com/4487-2/">https://usn.ubuntu.com/4487-2/</a><br><a href="https://www.openwall.com/lists/oss-security/2020/07/31/1">https://www.openwall.com/lists/oss-security/2020/07/31/1</a><br></details> |
| libxml2 | CVE-2020-24977 | MEDIUM | 2.9.9-r2 | 2.9.9-r3 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-24977">https://access.redhat.com/security/cve/CVE-2020-24977</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2">https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/178">https://gitlab.gnome.org/GNOME/libxml2/-/issues/178</a><br><a href="https://linux.oracle.com/cve/CVE-2020-24977.html">https://linux.oracle.com/cve/CVE-2020-24977.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1597.html">https://linux.oracle.com/errata/ELSA-2021-1597.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">https://nvd.nist.gov/vuln/detail/CVE-2020-24977</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20200924-0001/">https://security.netapp.com/advisory/ntap-20200924-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| musl | CVE-2020-28928 | MEDIUM | 1.1.20-r5 | 1.1.20-r6 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/20/4">http://www.openwall.com/lists/oss-security/2020/11/20/4</a><br><a href="https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html">https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/</a><br><a href="https://musl.libc.org/releases.html">https://musl.libc.org/releases.html</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| musl-utils | CVE-2020-28928 | MEDIUM | 1.1.20-r5 | 1.1.20-r6 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2020/11/20/4">http://www.openwall.com/lists/oss-security/2020/11/20/4</a><br><a href="https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html">https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/</a><br><a href="https://musl.libc.org/releases.html">https://musl.libc.org/releases.html</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| nghttp2-libs | CVE-2020-11080 | HIGH | 1.35.1-r1 | 1.35.1-r2 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-11080">https://access.redhat.com/security/cve/CVE-2020-11080</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-2852.html">https://errata.almalinux.org/8/ALSA-2020-2852.html</a><br><a href="https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090">https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090</a><br><a href="https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394">https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394</a><br><a href="https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr">https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr</a><br><a href="https://linux.oracle.com/cve/CVE-2020-11080.html">https://linux.oracle.com/cve/CVE-2020-11080.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-5765.html">https://linux.oracle.com/errata/ELSA-2020-5765.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">https://nvd.nist.gov/vuln/detail/CVE-2020-11080</a><br><a href="https://www.debian.org/security/2020/dsa-4696">https://www.debian.org/security/2020/dsa-4696</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| openssl | CVE-2020-1967 | HIGH | 1.1.1d-r2 | 1.1.1g-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html</a><br><a href="http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html">http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html</a><br><a href="http://seclists.org/fulldisclosure/2020/May/5">http://seclists.org/fulldisclosure/2020/May/5</a><br><a href="http://www.openwall.com/lists/oss-security/2020/04/22/2">http://www.openwall.com/lists/oss-security/2020/04/22/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-1967">https://access.redhat.com/security/cve/CVE-2020-1967</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1</a><br><a href="https://github.com/irsl/CVE-2020-1967">https://github.com/irsl/CVE-2020-1967</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440</a><br><a href="https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">https://nvd.nist.gov/vuln/detail/CVE-2020-1967</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2020-0015.html">https://rustsec.org/advisories/RUSTSEC-2020-0015.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202004-10">https://security.gentoo.org/glsa/202004-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200424-0003/">https://security.netapp.com/advisory/ntap-20200424-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20200717-0004/">https://security.netapp.com/advisory/ntap-20200717-0004/</a><br><a href="https://www.debian.org/security/2020/dsa-4661">https://www.debian.org/security/2020/dsa-4661</a><br><a href="https://www.openssl.org/news/secadv/20200421.txt">https://www.openssl.org/news/secadv/20200421.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_20_05">https://www.synology.com/security/advisory/Synology_SA_20_05</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL">https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL</a><br><a href="https://www.tenable.com/security/tns-2020-03">https://www.tenable.com/security/tns-2020-03</a><br><a href="https://www.tenable.com/security/tns-2020-04">https://www.tenable.com/security/tns-2020-04</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| openssl | CVE-2021-23840 | HIGH | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23840">https://access.redhat.com/security/cve/CVE-2021-23840</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23840.html">https://linux.oracle.com/cve/CVE-2021-23840.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0057.html">https://rustsec.org/advisories/RUSTSEC-2021-0057.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| openssl | CVE-2021-3450 | HIGH | 1.1.1d-r2 | 1.1.1k-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/27/1">http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/27/2">http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/3">http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/4">http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3450">https://access.redhat.com/security/cve/CVE-2021-3450</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3450.html">https://linux.oracle.com/cve/CVE-2021-3450.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9151.html">https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href="https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html">https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">https://nvd.nist.gov/vuln/detail/CVE-2021-3450</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0056.html">https://rustsec.org/advisories/RUSTSEC-2021-0056.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0006/">https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href="https://www.openssl.org/news/secadv/20210325.txt">https://www.openssl.org/news/secadv/20210325.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-05">https://www.tenable.com/security/tns-2021-05</a><br><a href="https://www.tenable.com/security/tns-2021-08">https://www.tenable.com/security/tns-2021-08</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| openssl | CVE-2020-1971 | MEDIUM | 1.1.1d-r2 | 1.1.1i-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/09/14/2">http://www.openwall.com/lists/oss-security/2021/09/14/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-1971">https://access.redhat.com/security/cve/CVE-2020-1971</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676</a><br><a href="https://linux.oracle.com/cve/CVE-2020-1971.html">https://linux.oracle.com/cve/CVE-2020-1971.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9150.html">https://linux.oracle.com/errata/ELSA-2021-9150.html</a><br><a href="https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E">https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">https://nvd.nist.gov/vuln/detail/CVE-2020-1971</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202012-13">https://security.gentoo.org/glsa/202012-13</a><br><a href="https://security.netapp.com/advisory/ntap-20201218-0005/">https://security.netapp.com/advisory/ntap-20201218-0005/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4662-1">https://ubuntu.com/security/notices/USN-4662-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2020/dsa-4807">https://www.debian.org/security/2020/dsa-4807</a><br><a href="https://www.openssl.org/news/secadv/20201208.txt">https://www.openssl.org/news/secadv/20201208.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2020-11">https://www.tenable.com/security/tns-2020-11</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| openssl | CVE-2021-23841 | MEDIUM | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/May/67">http://seclists.org/fulldisclosure/2021/May/67</a><br><a href="http://seclists.org/fulldisclosure/2021/May/68">http://seclists.org/fulldisclosure/2021/May/68</a><br><a href="http://seclists.org/fulldisclosure/2021/May/70">http://seclists.org/fulldisclosure/2021/May/70</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23841">https://access.redhat.com/security/cve/CVE-2021-23841</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23841.html">https://linux.oracle.com/cve/CVE-2021-23841.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9561.html">https://linux.oracle.com/errata/ELSA-2021-9561.html</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0058.html">https://rustsec.org/advisories/RUSTSEC-2021-0058.html</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://support.apple.com/kb/HT212528">https://support.apple.com/kb/HT212528</a><br><a href="https://support.apple.com/kb/HT212529">https://support.apple.com/kb/HT212529</a><br><a href="https://support.apple.com/kb/HT212534">https://support.apple.com/kb/HT212534</a><br><a href="https://ubuntu.com/security/notices/USN-4738-1">https://ubuntu.com/security/notices/USN-4738-1</a><br><a href="https://ubuntu.com/security/notices/USN-4745-1">https://ubuntu.com/security/notices/USN-4745-1</a><br><a href="https://www.debian.org/security/2021/dsa-4855">https://www.debian.org/security/2021/dsa-4855</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-03">https://www.tenable.com/security/tns-2021-03</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br></details> |
| openssl | CVE-2021-3449 | MEDIUM | 1.1.1d-r2 | 1.1.1k-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/03/27/1">http://www.openwall.com/lists/oss-security/2021/03/27/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/27/2">http://www.openwall.com/lists/oss-security/2021/03/27/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/3">http://www.openwall.com/lists/oss-security/2021/03/28/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/03/28/4">http://www.openwall.com/lists/oss-security/2021/03/28/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3449">https://access.redhat.com/security/cve/CVE-2021-3449</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10356</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3449.html">https://linux.oracle.com/cve/CVE-2021-3449.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9151.html">https://linux.oracle.com/errata/ELSA-2021-9151.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0055.html">https://rustsec.org/advisories/RUSTSEC-2021-0055.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc</a><br><a href="https://security.gentoo.org/glsa/202103-03">https://security.gentoo.org/glsa/202103-03</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0006/">https://security.netapp.com/advisory/ntap-20210326-0006/</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0002/">https://security.netapp.com/advisory/ntap-20210513-0002/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd</a><br><a href="https://ubuntu.com/security/notices/USN-4891-1">https://ubuntu.com/security/notices/USN-4891-1</a><br><a href="https://ubuntu.com/security/notices/USN-5038-1">https://ubuntu.com/security/notices/USN-5038-1</a><br><a href="https://www.debian.org/security/2021/dsa-4875">https://www.debian.org/security/2021/dsa-4875</a><br><a href="https://www.openssl.org/news/secadv/20210325.txt">https://www.openssl.org/news/secadv/20210325.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-05">https://www.tenable.com/security/tns-2021-05</a><br><a href="https://www.tenable.com/security/tns-2021-06">https://www.tenable.com/security/tns-2021-06</a><br><a href="https://www.tenable.com/security/tns-2021-09">https://www.tenable.com/security/tns-2021-09</a><br><a href="https://www.tenable.com/security/tns-2021-10">https://www.tenable.com/security/tns-2021-10</a><br></details> |
| openssl | CVE-2021-23839 | LOW | 1.1.1d-r2 | 1.1.1j-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23839">https://access.redhat.com/security/cve/CVE-2021-23839</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547</a><br><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846</a><br><a href="https://security.netapp.com/advisory/ntap-20210219-0009/">https://security.netapp.com/advisory/ntap-20210219-0009/</a><br><a href="https://www.openssl.org/news/secadv/20210216.txt">https://www.openssl.org/news/secadv/20210216.txt</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| pcre | CVE-2020-14155 | MEDIUM | 8.42-r1 | 8.42-r2 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a><br><a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14155">https://access.redhat.com/security/cve/CVE-2020-14155</a><br><a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4373.html">https://errata.almalinux.org/8/ALSA-2021-4373.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-14155.html">https://linux.oracle.com/cve/CVE-2020-14155.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4373.html">https://linux.oracle.com/errata/ELSA-2021-4373.html</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">https://nvd.nist.gov/vuln/detail/CVE-2020-14155</a><br><a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a><br><a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a><br><a href="https://ubuntu.com/security/notices/USN-5425-1">https://ubuntu.com/security/notices/USN-5425-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a><br></details> |
| php7 | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7 | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7 | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7 | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7 | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7 | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-bcmath | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bcmath | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-bcmath | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bcmath | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bcmath | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bcmath | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-bz2 | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bz2 | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-bz2 | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bz2 | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bz2 | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-bz2 | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-calendar | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-calendar | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-calendar | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-calendar | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-calendar | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-calendar | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-common | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-common | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-common | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-common | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-common | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-common | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-ctype | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ctype | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-ctype | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ctype | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ctype | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ctype | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-curl | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-curl | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-curl | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-curl | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-curl | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-curl | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-dom | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-dom | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-dom | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-dom | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-dom | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-dom | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-exif | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-exif | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-exif | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-exif | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-exif | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-exif | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-fileinfo | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fileinfo | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-fileinfo | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fileinfo | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fileinfo | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fileinfo | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-fpm | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fpm | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-fpm | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fpm | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fpm | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-fpm | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-ftp | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ftp | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-ftp | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ftp | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ftp | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ftp | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-gd | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gd | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-gd | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gd | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gd | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gd | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-gettext | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gettext | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-gettext | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gettext | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gettext | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-gettext | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-iconv | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-iconv | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-iconv | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-iconv | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-iconv | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-iconv | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-imap | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-imap | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-imap | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-imap | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-imap | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-imap | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-intl | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-intl | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-intl | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-intl | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-intl | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-intl | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-json | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-json | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-json | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-json | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-json | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-json | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-ldap | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ldap | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-ldap | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ldap | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ldap | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-ldap | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-mbstring | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mbstring | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-mbstring | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mbstring | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mbstring | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mbstring | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-mysqli | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqli | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-mysqli | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqli | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqli | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqli | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-mysqlnd | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqlnd | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-mysqlnd | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqlnd | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqlnd | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-mysqlnd | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-opcache | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-opcache | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-opcache | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-opcache | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-opcache | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-opcache | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-openssl | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-openssl | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-openssl | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-openssl | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-openssl | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-openssl | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pcntl | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pcntl | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pcntl | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pcntl | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pcntl | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pcntl | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pdo | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pdo | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pdo_mysql | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_mysql | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pdo_mysql | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_mysql | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_mysql | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_mysql | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pdo_pgsql | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_pgsql | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pdo_pgsql | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_pgsql | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_pgsql | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_pgsql | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pdo_sqlite | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_sqlite | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pdo_sqlite | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_sqlite | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_sqlite | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pdo_sqlite | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pear | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pear | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pear | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pear | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pear | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pear | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-pgsql | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pgsql | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-pgsql | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pgsql | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pgsql | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-pgsql | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-phar | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-phar | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-phar | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-phar | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-phar | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-phar | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-posix | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-posix | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-posix | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-posix | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-posix | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-posix | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-session | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-session | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-session | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-session | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-session | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-session | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-shmop | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-shmop | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-shmop | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-shmop | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-shmop | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-shmop | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-simplexml | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-simplexml | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-simplexml | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-simplexml | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-simplexml | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-simplexml | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-soap | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-soap | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-soap | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-soap | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-soap | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-soap | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-sockets | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sockets | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-sockets | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sockets | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sockets | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sockets | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-sqlite3 | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sqlite3 | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-sqlite3 | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sqlite3 | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sqlite3 | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sqlite3 | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-sysvmsg | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvmsg | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-sysvmsg | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvmsg | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvmsg | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvmsg | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-sysvsem | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvsem | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-sysvsem | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvsem | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvsem | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvsem | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-sysvshm | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvshm | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-sysvshm | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvshm | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvshm | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-sysvshm | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-tokenizer | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-tokenizer | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-tokenizer | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-tokenizer | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-tokenizer | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-tokenizer | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-wddx | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-wddx | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-wddx | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-wddx | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-wddx | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-wddx | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-xml | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xml | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-xml | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xml | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xml | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xml | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-xmlreader | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlreader | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-xmlreader | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlreader | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlreader | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlreader | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-xmlrpc | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlrpc | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-xmlrpc | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlrpc | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlrpc | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlrpc | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-xmlwriter | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlwriter | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-xmlwriter | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlwriter | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlwriter | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xmlwriter | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-xsl | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xsl | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-xsl | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xsl | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xsl | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-xsl | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| php7-zip | CVE-2020-7062 | HIGH | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1">http://git.php.net/?p=php-src.git;a=commit;h=e73d8e2627e6e0aa91441ffa745661c6664906f1</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7062">https://access.redhat.com/security/cve/CVE-2020-7062</a><br><a href="https://bugs.php.net/bug.php?id=79221">https://bugs.php.net/bug.php?id=79221</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7062.html">https://linux.oracle.com/cve/CVE-2020-7062.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-zip | CVE-2019-11048 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-11048">https://access.redhat.com/security/cve/CVE-2019-11048</a><br><a href="https://bugs.php.net/bug.php?id=78875">https://bugs.php.net/bug.php?id=78875</a><br><a href="https://bugs.php.net/bug.php?id=78876">https://bugs.php.net/bug.php?id=78876</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2019-11048.html">https://linux.oracle.com/cve/CVE-2019-11048.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/</a><br><a href="https://security.netapp.com/advisory/ntap-20200528-0006/">https://security.netapp.com/advisory/ntap-20200528-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4375-1">https://ubuntu.com/security/notices/USN-4375-1</a><br><a href="https://usn.ubuntu.com/4375-1/">https://usn.ubuntu.com/4375-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| php7-zip | CVE-2020-7063 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd">http://git.php.net/?p=php-src.git;a=commit;h=ead40a66785aedaa393f953a0ed9224adaf040cd</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7063">https://access.redhat.com/security/cve/CVE-2020-7063</a><br><a href="https://bugs.php.net/bug.php?id=79082">https://bugs.php.net/bug.php?id=79082</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7063.html">https://linux.oracle.com/cve/CVE-2020-7063.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html</a><br><a href="https://security.gentoo.org/glsa/202003-57">https://security.gentoo.org/glsa/202003-57</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-zip | CVE-2020-7064 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff">http://git.php.net/?p=php-src.git;a=commit;h=0c77b4307df73217283a4aaf9313e1a33a0967ff</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7064">https://access.redhat.com/security/cve/CVE-2020-7064</a><br><a href="https://bugs.php.net/bug.php?id=79282">https://bugs.php.net/bug.php?id=79282</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7064.html">https://linux.oracle.com/cve/CVE-2020-7064.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-1/">https://usn.ubuntu.com/4330-1/</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-zip | CVE-2020-7066 | MEDIUM | 7.2.27-r0 | 7.2.31-r0 | <details><summary>Expand...</summary><a href="http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7">http://git.php.net/?p=php-src.git;a=commit;h=a33d05b1474caee449b88f53d61bee720c57caf7</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7066">https://access.redhat.com/security/cve/CVE-2020-7066</a><br><a href="https://bugs.php.net/bug.php?id=79329">https://bugs.php.net/bug.php?id=79329</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-3662.html">https://errata.almalinux.org/8/ALSA-2020-3662.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7066.html">https://linux.oracle.com/cve/CVE-2020-7066.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3662.html">https://linux.oracle.com/errata/ELSA-2020-3662.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html</a><br><a href="https://security.netapp.com/advisory/ntap-20200403-0001/">https://security.netapp.com/advisory/ntap-20200403-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4330-1">https://ubuntu.com/security/notices/USN-4330-1</a><br><a href="https://ubuntu.com/security/notices/USN-4330-2">https://ubuntu.com/security/notices/USN-4330-2</a><br><a href="https://usn.ubuntu.com/4330-2/">https://usn.ubuntu.com/4330-2/</a><br><a href="https://www.debian.org/security/2020/dsa-4717">https://www.debian.org/security/2020/dsa-4717</a><br><a href="https://www.debian.org/security/2020/dsa-4719">https://www.debian.org/security/2020/dsa-4719</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br></details> |
| php7-zip | CVE-2020-7068 | LOW | 7.2.27-r0 | 7.2.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7068">https://access.redhat.com/security/cve/CVE-2020-7068</a><br><a href="https://bugs.php.net/bug.php?id=79797">https://bugs.php.net/bug.php?id=79797</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4213.html">https://errata.almalinux.org/8/ALSA-2021-4213.html</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7068.html">https://linux.oracle.com/cve/CVE-2020-7068.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4213.html">https://linux.oracle.com/errata/ELSA-2021-4213.html</a><br><a href="https://security.gentoo.org/glsa/202009-10">https://security.gentoo.org/glsa/202009-10</a><br><a href="https://security.netapp.com/advisory/ntap-20200918-0005/">https://security.netapp.com/advisory/ntap-20200918-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.debian.org/security/2021/dsa-4856">https://www.debian.org/security/2021/dsa-4856</a><br></details> |
| python2 | CVE-2019-15903 | HIGH | 2.7.16-r2 | 2.7.17-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a><br><a href="http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html">http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html</a><br><a href="http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html">http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html</a><br><a href="http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html">http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html</a><br><a href="http://seclists.org/fulldisclosure/2019/Dec/23">http://seclists.org/fulldisclosure/2019/Dec/23</a><br><a href="http://seclists.org/fulldisclosure/2019/Dec/26">http://seclists.org/fulldisclosure/2019/Dec/26</a><br><a href="http://seclists.org/fulldisclosure/2019/Dec/27">http://seclists.org/fulldisclosure/2019/Dec/27</a><br><a href="http://seclists.org/fulldisclosure/2019/Dec/30">http://seclists.org/fulldisclosure/2019/Dec/30</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3210">https://access.redhat.com/errata/RHSA-2019:3210</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3237">https://access.redhat.com/errata/RHSA-2019:3237</a><br><a href="https://access.redhat.com/errata/RHSA-2019:3756">https://access.redhat.com/errata/RHSA-2019:3756</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15903">https://access.redhat.com/security/cve/CVE-2019-15903</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903</a><br><a href="https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43">https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43</a><br><a href="https://github.com/libexpat/libexpat/issues/317">https://github.com/libexpat/libexpat/issues/317</a><br><a href="https://github.com/libexpat/libexpat/issues/342">https://github.com/libexpat/libexpat/issues/342</a><br><a href="https://github.com/libexpat/libexpat/pull/318">https://github.com/libexpat/libexpat/pull/318</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15903.html">https://linux.oracle.com/cve/CVE-2019-15903.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-4484.html">https://linux.oracle.com/errata/ELSA-2020-4484.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">https://nvd.nist.gov/vuln/detail/CVE-2019-15903</a><br><a href="https://seclists.org/bugtraq/2019/Dec/17">https://seclists.org/bugtraq/2019/Dec/17</a><br><a href="https://seclists.org/bugtraq/2019/Dec/21">https://seclists.org/bugtraq/2019/Dec/21</a><br><a href="https://seclists.org/bugtraq/2019/Dec/23">https://seclists.org/bugtraq/2019/Dec/23</a><br><a href="https://seclists.org/bugtraq/2019/Nov/1">https://seclists.org/bugtraq/2019/Nov/1</a><br><a href="https://seclists.org/bugtraq/2019/Nov/24">https://seclists.org/bugtraq/2019/Nov/24</a><br><a href="https://seclists.org/bugtraq/2019/Oct/29">https://seclists.org/bugtraq/2019/Oct/29</a><br><a href="https://seclists.org/bugtraq/2019/Sep/30">https://seclists.org/bugtraq/2019/Sep/30</a><br><a href="https://seclists.org/bugtraq/2019/Sep/37">https://seclists.org/bugtraq/2019/Sep/37</a><br><a href="https://security.gentoo.org/glsa/201911-08">https://security.gentoo.org/glsa/201911-08</a><br><a href="https://security.netapp.com/advisory/ntap-20190926-0004/">https://security.netapp.com/advisory/ntap-20190926-0004/</a><br><a href="https://support.apple.com/kb/HT210785">https://support.apple.com/kb/HT210785</a><br><a href="https://support.apple.com/kb/HT210788">https://support.apple.com/kb/HT210788</a><br><a href="https://support.apple.com/kb/HT210789">https://support.apple.com/kb/HT210789</a><br><a href="https://support.apple.com/kb/HT210790">https://support.apple.com/kb/HT210790</a><br><a href="https://support.apple.com/kb/HT210793">https://support.apple.com/kb/HT210793</a><br><a href="https://support.apple.com/kb/HT210794">https://support.apple.com/kb/HT210794</a><br><a href="https://support.apple.com/kb/HT210795">https://support.apple.com/kb/HT210795</a><br><a href="https://ubuntu.com/security/notices/USN-4132-1">https://ubuntu.com/security/notices/USN-4132-1</a><br><a href="https://ubuntu.com/security/notices/USN-4132-2">https://ubuntu.com/security/notices/USN-4132-2</a><br><a href="https://ubuntu.com/security/notices/USN-4165-1">https://ubuntu.com/security/notices/USN-4165-1</a><br><a href="https://ubuntu.com/security/notices/USN-4202-1">https://ubuntu.com/security/notices/USN-4202-1</a><br><a href="https://ubuntu.com/security/notices/USN-4335-1">https://ubuntu.com/security/notices/USN-4335-1</a><br><a href="https://usn.ubuntu.com/4132-1/">https://usn.ubuntu.com/4132-1/</a><br><a href="https://usn.ubuntu.com/4132-2/">https://usn.ubuntu.com/4132-2/</a><br><a href="https://usn.ubuntu.com/4165-1/">https://usn.ubuntu.com/4165-1/</a><br><a href="https://usn.ubuntu.com/4202-1/">https://usn.ubuntu.com/4202-1/</a><br><a href="https://usn.ubuntu.com/4335-1/">https://usn.ubuntu.com/4335-1/</a><br><a href="https://www.debian.org/security/2019/dsa-4530">https://www.debian.org/security/2019/dsa-4530</a><br><a href="https://www.debian.org/security/2019/dsa-4549">https://www.debian.org/security/2019/dsa-4549</a><br><a href="https://www.debian.org/security/2019/dsa-4571">https://www.debian.org/security/2019/dsa-4571</a><br><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903">https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.tenable.com/security/tns-2021-11">https://www.tenable.com/security/tns-2021-11</a><br></details> |
| python2 | CVE-2019-18348 | MEDIUM | 2.7.16-r2 | 2.7.18-r0 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-18348">https://access.redhat.com/security/cve/CVE-2019-18348</a><br><a href="https://bugs.python.org/issue30458#msg347282">https://bugs.python.org/issue30458#msg347282</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1727276">https://bugzilla.redhat.com/show_bug.cgi?id=1727276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">https://nvd.nist.gov/vuln/detail/CVE-2019-18348</a><br><a href="https://security.netapp.com/advisory/ntap-20191107-0004/">https://security.netapp.com/advisory/ntap-20191107-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4333-1">https://ubuntu.com/security/notices/USN-4333-1</a><br><a href="https://ubuntu.com/security/notices/USN-4333-2">https://ubuntu.com/security/notices/USN-4333-2</a><br><a href="https://usn.ubuntu.com/4333-1/">https://usn.ubuntu.com/4333-1/</a><br><a href="https://usn.ubuntu.com/4333-2/">https://usn.ubuntu.com/4333-2/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
| sqlite | CVE-2020-11655 | HIGH | 3.28.0-r2 | 3.28.0-r3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11655">https://access.redhat.com/security/cve/CVE-2020-11655</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html">https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html">https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br><a href="https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11">https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11</a><br><a href="https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c">https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c</a><br></details> |
| sqlite-libs | CVE-2020-11655 | HIGH | 3.28.0-r2 | 3.28.0-r3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-11655">https://access.redhat.com/security/cve/CVE-2020-11655</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html">https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html">https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html</a><br><a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a><br><a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a><br><a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a><br><a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br><a href="https://www.tenable.com/security/tns-2021-14">https://www.tenable.com/security/tns-2021-14</a><br><a href="https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11">https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11</a><br><a href="https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c">https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c</a><br></details> |
**composer**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| guzzlehttp/guzzle | CVE-2022-29248 | HIGH | 6.5.5 | 7.4.3, 6.5.6 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-cwmx-hcrq-mhc3">https://github.com/advisories/GHSA-cwmx-hcrq-mhc3</a><br><a href="https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab">https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab</a><br><a href="https://github.com/guzzle/guzzle/pull/3018">https://github.com/guzzle/guzzle/pull/3018</a><br><a href="https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3">https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3</a><br><a href="https://www.drupal.org/sa-core-2022-010">https://www.drupal.org/sa-core-2022-010</a><br></details> |
| guzzlehttp/psr7 | CVE-2022-24775 | HIGH | 1.7.0 | 2.1.1, 1.8.4 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-q7rv-6hp3-vh96">https://github.com/advisories/GHSA-q7rv-6hp3-vh96</a><br><a href="https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1">https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1</a><br><a href="https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc">https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc</a><br><a href="https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96">https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24775">https://nvd.nist.gov/vuln/detail/CVE-2022-24775</a><br><a href="https://www.drupal.org/sa-core-2022-006">https://www.drupal.org/sa-core-2022-006</a><br></details> |
| league/flysystem | CVE-2021-32708 | HIGH | 1.0.70 | 1.1.4, 2.1.1 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-9f46-5r25-5wfm">https://github.com/advisories/GHSA-9f46-5r25-5wfm</a><br><a href="https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74">https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74</a><br><a href="https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32">https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32</a><br><a href="https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm">https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32708">https://nvd.nist.gov/vuln/detail/CVE-2021-32708</a><br><a href="https://packagist.org/packages/league/flysystem">https://packagist.org/packages/league/flysystem</a><br></details> |
| twig/twig | CVE-2022-23614 | CRITICAL | v2.13.1 | 2.14.11, 3.3.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23614">https://access.redhat.com/security/cve/CVE-2022-23614</a><br><a href="https://github.com/advisories/GHSA-5mv2-rx3q-4w2v">https://github.com/advisories/GHSA-5mv2-rx3q-4w2v</a><br><a href="https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9">https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9</a><br><a href="https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5">https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5</a><br><a href="https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v">https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23614">https://nvd.nist.gov/vuln/detail/CVE-2022-23614</a><br><a href="https://symfony.com/blog/twig-security-release-disallow-non-closures-in-the-sort-filter">https://symfony.com/blog/twig-security-release-disallow-non-closures-in-the-sort-filter</a><br><a href="https://www.debian.org/security/2022/dsa-5107">https://www.debian.org/security/2022/dsa-5107</a><br></details> |