TrueChartsClone/charts/stable/strapi/security.md

5.1 MiB
Raw Blame History

hide
toc

Security Overview

Helm-Chart

Scan Results

Chart Object: strapi/charts/postgresql/templates/common.yaml

Type Misconfiguration ID Check Severity Explaination Links
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV011 CPU not limited LOW
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV015 CPU requests not specified LOW
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
Kubernetes Security Check KSV016 Memory requests not specified LOW
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
Kubernetes Security Check KSV017 Privileged container HIGH
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
Kubernetes Security Check KSV018 Memory not limited LOW
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV023 hostPath volumes mounted MEDIUM
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-postgresql' should not set 'spec.template.volumes.hostPath'
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
Kubernetes Security Check KSV029 A root primary or supplementary GID set LOW
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
Type Misconfiguration ID Check Severity Explaination Links
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-strapi' of Deployment 'RELEASE-NAME-strapi' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV011 CPU not limited LOW
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'resources.limits.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-strapi' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-strapi' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV015 CPU requests not specified LOW
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'resources.requests.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
Kubernetes Security Check KSV016 Memory requests not specified LOW
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'resources.requests.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
Kubernetes Security Check KSV017 Privileged container HIGH
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.privileged' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
Kubernetes Security Check KSV018 Memory not limited LOW
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'resources.limits.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'RELEASE-NAME-strapi' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'RELEASE-NAME-strapi' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-strapi' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV023 hostPath volumes mounted MEDIUM
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-strapi' should not set 'spec.template.volumes.hostPath'
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
Kubernetes Security Check KSV029 A root primary or supplementary GID set LOW
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-strapi' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029

Containers

Detected Containers
      tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1
      tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1
      tccr.io/truecharts/strapi:v3.6.8@sha256:25d345a1787c5be5ef1771b069e0eeaeba5b244a62870cc2b9d5acba0eaedd89
Scan Results

Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12)

debian

Package Vulnerability Severity Installed Version Fixed Version Links
apt CVE-2011-3374 LOW 1.8.2.3
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
bash CVE-2019-18276 LOW 5.0-4
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
bsdutils CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
bsdutils CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
coreutils CVE-2016-2781 LOW 8.30-3
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
coreutils CVE-2017-18018 LOW 8.30-3
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
curl CVE-2021-22946 HIGH 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22947 MEDIUM 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2022-22576 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27781 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2022-27782 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2021-22898 LOW 7.64.0-4+deb10u2
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2021-22922 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22923 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22924 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
dpkg CVE-2022-1664 MEDIUM 1.19.7 1.19.8
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
fdisk CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
fdisk CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
gcc-8-base CVE-2018-12886 HIGH 8.3.0-6
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
gcc-8-base CVE-2019-15847 HIGH 8.3.0-6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
gpgv CVE-2019-14855 LOW 2.2.12-1+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
libapt-pkg5.0 CVE-2011-3374 LOW 1.8.2.3
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
libblkid1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libblkid1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libc-bin CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-bin CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-bin CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-bin CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc-bin CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-bin CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc-bin CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc-bin CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc-bin CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc-bin CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-bin CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-bin CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc-l10n CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-l10n CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-l10n CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-l10n CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-l10n CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-l10n CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-l10n CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-l10n CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-l10n CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc-l10n CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-l10n CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-l10n CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc-l10n CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc-l10n CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc-l10n CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc-l10n CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-l10n CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-l10n CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc6 CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc6 CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc6 CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6 CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc6 CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc6 CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc6 CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc6 CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6 CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc6 CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libcom-err2 CVE-2022-1304 HIGH 1.44.5-1+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libcurl4 CVE-2021-22946 HIGH 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22947 MEDIUM 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2022-22576 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27774 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27776 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27781 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
libcurl4 CVE-2022-27782 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
libcurl4 CVE-2021-22898 LOW 7.64.0-4+deb10u2
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl4 CVE-2021-22922 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22923 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22924 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libdb5.3 CVE-2019-8457 CRITICAL 5.3.28+dfsg1-0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libfdisk1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libfdisk1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libgcc1 CVE-2018-12886 HIGH 8.3.0-6
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libgcc1 CVE-2019-15847 HIGH 8.3.0-6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
libgcrypt20 CVE-2021-33560 HIGH 1.8.4-5+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libgcrypt20 CVE-2019-13627 MEDIUM 1.8.4-5+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
libgcrypt20 CVE-2018-6829 LOW 1.8.4-5+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
libgnutls30 CVE-2021-4209 MEDIUM 3.6.7-4+deb10u7
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
libgnutls30 CVE-2011-3389 LOW 3.6.7-4+deb10u7
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
libgssapi-krb5-2 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libgssapi-krb5-2 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libidn2-0 CVE-2019-12290 HIGH 2.0.5-1+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
libk5crypto3 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libk5crypto3 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5-3 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5-3 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5support0 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5support0 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libldap-2.4-2 CVE-2015-3276 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
libldap-2.4-2 CVE-2017-14159 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.4-2 CVE-2017-17740 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.4-2 CVE-2020-15719 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2015-3276 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
libldap-common CVE-2017-14159 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2017-17740 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2020-15719 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
liblz4-1 CVE-2019-17543 LOW 1.8.3-1+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libmount1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libmount1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libncurses6 CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncurses6 CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libncursesw6 CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncursesw6 CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libnghttp2-14 CVE-2020-11080 HIGH 1.36.0-2+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libpcre3 CVE-2020-14155 MEDIUM 2:8.39-12
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcre3 CVE-2017-11164 LOW 2:8.39-12
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcre3 CVE-2017-16231 LOW 2:8.39-12
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcre3 CVE-2017-7245 LOW 2:8.39-12
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3 CVE-2017-7246 LOW 2:8.39-12
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3 CVE-2019-20838 LOW 2:8.39-12
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libseccomp2 CVE-2019-9893 LOW 2.3.3-4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
libsepol1 CVE-2021-36084 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36085 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36086 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36087 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
libsmartcols1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libsmartcols1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libsqlite3-0 CVE-2019-19603 HIGH 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
libsqlite3-0 CVE-2019-19645 MEDIUM 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
libsqlite3-0 CVE-2019-19924 MEDIUM 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
libsqlite3-0 CVE-2020-13631 MEDIUM 3.27.2-3+deb10u1
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libsqlite3-0 CVE-2021-45346 MEDIUM 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
libsqlite3-0 CVE-2019-19244 LOW 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
libsqlite3-0 CVE-2020-11656 LOW 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
libsqlite3-0 CVE-2021-36690 LOW 3.27.2-3+deb10u1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
libssh2-1 CVE-2019-13115 HIGH 1.8.0-2.1
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
libssh2-1 CVE-2019-17498 LOW 1.8.0-2.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
libssl1.1 CVE-2007-6755 LOW 1.1.1n-0+deb10u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
libssl1.1 CVE-2010-0928 LOW 1.1.1n-0+deb10u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
libstdc++6 CVE-2018-12886 HIGH 8.3.0-6
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libstdc++6 CVE-2019-15847 HIGH 8.3.0-6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
libsystemd0 CVE-2019-3843 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2019-3844 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2021-3997 MEDIUM 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libsystemd0 CVE-2013-4392 LOW 241-7~deb10u8
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
libsystemd0 CVE-2019-20386 LOW 241-7~deb10u8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2020-13529 LOW 241-7~deb10u8
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
libsystemd0 CVE-2020-13776 LOW 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
libtasn1-6 CVE-2018-1000654 LOW 4.13-3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
libtinfo6 CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libtinfo6 CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libudev1 CVE-2019-3843 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2019-3844 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2021-3997 MEDIUM 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libudev1 CVE-2013-4392 LOW 241-7~deb10u8
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
libudev1 CVE-2019-20386 LOW 241-7~deb10u8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2020-13529 LOW 241-7~deb10u8
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
libudev1 CVE-2020-13776 LOW 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
libuuid1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libuuid1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libxml2 CVE-2017-16932 HIGH 2.9.4+dfsg1-7+deb10u4
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2 CVE-2016-9318 MEDIUM 2.9.4+dfsg1-7+deb10u4
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxslt1.1 CVE-2015-9019 LOW 1.1.32-2.2~deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
locales CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
locales CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
locales CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
locales CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
locales CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
locales CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
locales CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
locales CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
locales CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
locales CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
locales CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
locales CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
locales CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
locales CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
locales CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
locales CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
locales CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
locales CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
login CVE-2007-5686 LOW 1:4.5-1.1
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
login CVE-2013-4235 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
login CVE-2018-7169 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
login CVE-2019-19882 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
mount CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
mount CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
ncurses-base CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
ncurses-base CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
openssl CVE-2007-6755 LOW 1.1.1n-0+deb10u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
openssl CVE-2010-0928 LOW 1.1.1n-0+deb10u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
passwd CVE-2007-5686 LOW 1:4.5-1.1
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
passwd CVE-2013-4235 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
passwd CVE-2018-7169 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
passwd CVE-2019-19882 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
perl-base CVE-2020-16156 HIGH 5.28.1-6+deb10u1
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-base CVE-2011-4116 LOW 5.28.1-6+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
tar CVE-2005-2541 LOW 1.30+dfsg-6
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
tar CVE-2019-9923 LOW 1.30+dfsg-6
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
tar CVE-2021-20193 LOW 1.30+dfsg-6
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
util-linux CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
util-linux CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/

jar

No Vulnerabilities found

gobinary

Package Vulnerability Severity Installed Version Fixed Version Links
github.com/opencontainers/runc CVE-2021-43784 MEDIUM v1.0.1 v1.0.3
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
github.com/opencontainers/runc CVE-2022-24769 MEDIUM v1.0.1 v1.1.2
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769

Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12)

debian

Package Vulnerability Severity Installed Version Fixed Version Links
apt CVE-2011-3374 LOW 1.8.2.3
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
bash CVE-2019-18276 LOW 5.0-4
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
bsdutils CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
bsdutils CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
coreutils CVE-2016-2781 LOW 8.30-3
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
coreutils CVE-2017-18018 LOW 8.30-3
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
curl CVE-2021-22946 HIGH 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22947 MEDIUM 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2022-22576 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27781 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2022-27782 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2021-22898 LOW 7.64.0-4+deb10u2
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2021-22922 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22923 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22924 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
dpkg CVE-2022-1664 MEDIUM 1.19.7 1.19.8
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
fdisk CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
fdisk CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
gcc-8-base CVE-2018-12886 HIGH 8.3.0-6
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
gcc-8-base CVE-2019-15847 HIGH 8.3.0-6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
gpgv CVE-2019-14855 LOW 2.2.12-1+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
libapt-pkg5.0 CVE-2011-3374 LOW 1.8.2.3
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
libblkid1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libblkid1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libc-bin CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-bin CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-bin CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-bin CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc-bin CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-bin CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc-bin CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc-bin CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc-bin CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc-bin CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-bin CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-bin CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc-l10n CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-l10n CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-l10n CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-l10n CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-l10n CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-l10n CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-l10n CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-l10n CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-l10n CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc-l10n CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-l10n CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-l10n CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc-l10n CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc-l10n CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc-l10n CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc-l10n CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-l10n CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-l10n CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-l10n CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc6 CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc6 CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc6 CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6 CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc6 CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc6 CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc6 CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc6 CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6 CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc6 CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libcom-err2 CVE-2022-1304 HIGH 1.44.5-1+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libcurl4 CVE-2021-22946 HIGH 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22947 MEDIUM 7.64.0-4+deb10u2
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2022-22576 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27774 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27776 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27781 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
libcurl4 CVE-2022-27782 MEDIUM 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
libcurl4 CVE-2021-22898 LOW 7.64.0-4+deb10u2
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl4 CVE-2021-22922 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22923 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22924 LOW 7.64.0-4+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libdb5.3 CVE-2019-8457 CRITICAL 5.3.28+dfsg1-0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libfdisk1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libfdisk1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libgcc1 CVE-2018-12886 HIGH 8.3.0-6
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libgcc1 CVE-2019-15847 HIGH 8.3.0-6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
libgcrypt20 CVE-2021-33560 HIGH 1.8.4-5+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libgcrypt20 CVE-2019-13627 MEDIUM 1.8.4-5+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
libgcrypt20 CVE-2018-6829 LOW 1.8.4-5+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
libgnutls30 CVE-2021-4209 MEDIUM 3.6.7-4+deb10u7
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
libgnutls30 CVE-2011-3389 LOW 3.6.7-4+deb10u7
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
libgssapi-krb5-2 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libgssapi-krb5-2 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libidn2-0 CVE-2019-12290 HIGH 2.0.5-1+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
libk5crypto3 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libk5crypto3 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5-3 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5-3 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5support0 CVE-2004-0971 LOW 1.17-3+deb10u3
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5support0 CVE-2018-5709 LOW 1.17-3+deb10u3
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libldap-2.4-2 CVE-2015-3276 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
libldap-2.4-2 CVE-2017-14159 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.4-2 CVE-2017-17740 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.4-2 CVE-2020-15719 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2015-3276 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
libldap-common CVE-2017-14159 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2017-17740 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2020-15719 LOW 2.4.47+dfsg-3+deb10u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
liblz4-1 CVE-2019-17543 LOW 1.8.3-1+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libmount1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libmount1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libncurses6 CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncurses6 CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libncursesw6 CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncursesw6 CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libnghttp2-14 CVE-2020-11080 HIGH 1.36.0-2+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libpcre3 CVE-2020-14155 MEDIUM 2:8.39-12
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcre3 CVE-2017-11164 LOW 2:8.39-12
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcre3 CVE-2017-16231 LOW 2:8.39-12
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcre3 CVE-2017-7245 LOW 2:8.39-12
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3 CVE-2017-7246 LOW 2:8.39-12
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3 CVE-2019-20838 LOW 2:8.39-12
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libseccomp2 CVE-2019-9893 LOW 2.3.3-4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
libsepol1 CVE-2021-36084 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36085 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36086 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36087 LOW 2.8-1
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
libsmartcols1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libsmartcols1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libsqlite3-0 CVE-2019-19603 HIGH 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
libsqlite3-0 CVE-2019-19645 MEDIUM 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
libsqlite3-0 CVE-2019-19924 MEDIUM 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
libsqlite3-0 CVE-2020-13631 MEDIUM 3.27.2-3+deb10u1
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libsqlite3-0 CVE-2021-45346 MEDIUM 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
libsqlite3-0 CVE-2019-19244 LOW 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
libsqlite3-0 CVE-2020-11656 LOW 3.27.2-3+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
libsqlite3-0 CVE-2021-36690 LOW 3.27.2-3+deb10u1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
libssh2-1 CVE-2019-13115 HIGH 1.8.0-2.1
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
libssh2-1 CVE-2019-17498 LOW 1.8.0-2.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
libssl1.1 CVE-2007-6755 LOW 1.1.1n-0+deb10u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
libssl1.1 CVE-2010-0928 LOW 1.1.1n-0+deb10u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
libstdc++6 CVE-2018-12886 HIGH 8.3.0-6
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libstdc++6 CVE-2019-15847 HIGH 8.3.0-6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
libsystemd0 CVE-2019-3843 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2019-3844 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2021-3997 MEDIUM 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libsystemd0 CVE-2013-4392 LOW 241-7~deb10u8
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
libsystemd0 CVE-2019-20386 LOW 241-7~deb10u8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2020-13529 LOW 241-7~deb10u8
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
libsystemd0 CVE-2020-13776 LOW 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
libtasn1-6 CVE-2018-1000654 LOW 4.13-3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
libtinfo6 CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libtinfo6 CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libudev1 CVE-2019-3843 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2019-3844 HIGH 241-7~deb10u8
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2021-3997 MEDIUM 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libudev1 CVE-2013-4392 LOW 241-7~deb10u8
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
libudev1 CVE-2019-20386 LOW 241-7~deb10u8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2020-13529 LOW 241-7~deb10u8
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
libudev1 CVE-2020-13776 LOW 241-7~deb10u8
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
libuuid1 CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libuuid1 CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libxml2 CVE-2017-16932 HIGH 2.9.4+dfsg1-7+deb10u4
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2 CVE-2016-9318 MEDIUM 2.9.4+dfsg1-7+deb10u4
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxslt1.1 CVE-2015-9019 LOW 1.1.32-2.2~deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
locales CVE-2021-33574 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
locales CVE-2021-35942 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
locales CVE-2022-23218 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
locales CVE-2022-23219 CRITICAL 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
locales CVE-2020-1751 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2020-1752 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2021-3326 HIGH 2.28-10+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
locales CVE-2021-3999 HIGH 2.28-10+deb10u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
locales CVE-2019-25013 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
locales CVE-2020-10029 MEDIUM 2.28-10+deb10u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2020-27618 MEDIUM 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
locales CVE-2010-4756 LOW 2.28-10+deb10u1
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
locales CVE-2016-10228 LOW 2.28-10+deb10u1
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
locales CVE-2018-20796 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
locales CVE-2019-1010022 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
locales CVE-2019-1010023 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
locales CVE-2019-1010024 LOW 2.28-10+deb10u1
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
locales CVE-2019-1010025 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
locales CVE-2019-19126 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
locales CVE-2019-9192 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
locales CVE-2020-6096 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
locales CVE-2021-27645 LOW 2.28-10+deb10u1
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
login CVE-2007-5686 LOW 1:4.5-1.1
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
login CVE-2013-4235 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
login CVE-2018-7169 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
login CVE-2019-19882 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
mount CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
mount CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
ncurses-base CVE-2022-29458 HIGH 6.1+20181013-2+deb10u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
ncurses-base CVE-2021-39537 LOW 6.1+20181013-2+deb10u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
openssl CVE-2007-6755 LOW 1.1.1n-0+deb10u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
openssl CVE-2010-0928 LOW 1.1.1n-0+deb10u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
passwd CVE-2007-5686 LOW 1:4.5-1.1
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
passwd CVE-2013-4235 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
passwd CVE-2018-7169 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
passwd CVE-2019-19882 LOW 1:4.5-1.1
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
perl-base CVE-2020-16156 HIGH 5.28.1-6+deb10u1
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-base CVE-2011-4116 LOW 5.28.1-6+deb10u1
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
tar CVE-2005-2541 LOW 1.30+dfsg-6
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
tar CVE-2019-9923 LOW 1.30+dfsg-6
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
tar CVE-2021-20193 LOW 1.30+dfsg-6
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
util-linux CVE-2021-37600 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
util-linux CVE-2022-0563 LOW 2.33.1-0.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/

jar

No Vulnerabilities found

gobinary

Package Vulnerability Severity Installed Version Fixed Version Links
github.com/opencontainers/runc CVE-2021-43784 MEDIUM v1.0.1 v1.0.3
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
github.com/opencontainers/runc CVE-2022-24769 MEDIUM v1.0.1 v1.1.2
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769

Container: tccr.io/truecharts/strapi:v3.6.8@sha256:25d345a1787c5be5ef1771b069e0eeaeba5b244a62870cc2b9d5acba0eaedd89 (debian 9.13)

debian

Package Vulnerability Severity Installed Version Fixed Version Links
apt CVE-2011-3374 LOW 1.4.11
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
apt-transport-https CVE-2011-3374 LOW 1.4.11
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
bash CVE-2019-18276 LOW 4.4-5
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
binutils CVE-2017-12448 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12448
https://sourceware.org/bugzilla/show_bug.cgi?id=21787
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12449 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12449
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12450 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12450
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12451 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451
https://sourceware.org/bugzilla/show_bug.cgi?id=21786
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12452 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12453 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12454 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12455 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12456 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12457 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12457
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12458 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12458
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12459 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-12459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12459
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12799 HIGH 2.28-5
Expand...http://www.securityfocus.com/bid/100292
https://access.redhat.com/security/cve/CVE-2017-12799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21933
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-13710 HIGH 2.28-5
Expand...http://www.securityfocus.com/bid/100499
https://access.redhat.com/security/cve/CVE-2017-13710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13710
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d6f8dea6798528de0fc762409595251eeeb1f547
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14333 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14333
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21990
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14729 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14729
https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/
https://sourceware.org/bugzilla/show_bug.cgi?id=22170
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
binutils CVE-2017-14745 HIGH 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14745
https://sourceware.org/bugzilla/show_bug.cgi?id=22148
binutils CVE-2018-6323 HIGH 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/102821
https://access.redhat.com/security/cve/CVE-2018-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323
https://sourceware.org/bugzilla/show_bug.cgi?id=22746
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/44035/
binutils CVE-2018-6543 HIGH 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/102985
https://access.redhat.com/security/cve/CVE-2018-6543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22769
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-7208 HIGH 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103077
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-7208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208
https://linux.oracle.com/cve/CVE-2018-7208.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22741
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-7643 HIGH 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103264
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-7643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643
https://linux.oracle.com/cve/CVE-2018-7643.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22905
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12967 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/100462
https://access.redhat.com/security/cve/CVE-2017-12967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21962
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-13757 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/100532
https://access.redhat.com/security/cve/CVE-2017-13757
https://sourceware.org/bugzilla/show_bug.cgi?id=22018
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a
binutils CVE-2017-14529 MEDIUM 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529
https://sourceware.org/bugzilla/show_bug.cgi?id=22113
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14974 MEDIUM 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14974
https://sourceware.org/bugzilla/show_bug.cgi?id=22163
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
binutils CVE-2017-9954 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/99307
https://access.redhat.com/security/cve/CVE-2017-9954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21670
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9955 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/99573
https://access.redhat.com/security/cve/CVE-2017-9955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955
https://sourceware.org/bugzilla/show_bug.cgi?id=21665
binutils CVE-2018-10372 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/103976
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-10372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372
https://linux.oracle.com/cve/CVE-2018-10372.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23064
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-10373 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/104000
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-10373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373
https://linux.oracle.com/cve/CVE-2018-10373.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23065
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-10534 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/104025
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-10534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534
https://linux.oracle.com/cve/CVE-2018-10534.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23110
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-10535 MEDIUM 2.28-5
Expand...http://www.securityfocus.com/bid/104021
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-10535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535
https://linux.oracle.com/cve/CVE-2018-10535.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23113
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-6759 MEDIUM 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103030
https://access.redhat.com/security/cve/CVE-2018-6759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22794
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-6872 MEDIUM 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103103
https://access.redhat.com/security/cve/CVE-2018-6872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22788
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
binutils CVE-2018-7568 MEDIUM 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-7568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568
https://linux.oracle.com/cve/CVE-2018-7568.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22894
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-7569 MEDIUM 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-7569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569
https://linux.oracle.com/cve/CVE-2018-7569.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22895
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-7570 MEDIUM 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-7570
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22881
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=01f7e10cf2dcf403462b2feed06c43135651556d
binutils CVE-2018-7642 MEDIUM 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-7642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642
https://linux.oracle.com/cve/CVE-2018-7642.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22887
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-13716 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-13716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
binutils CVE-2017-14128 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/100623
https://access.redhat.com/security/cve/CVE-2017-14128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22059
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14129 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/100624
https://access.redhat.com/security/cve/CVE-2017-14129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22047
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14130 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/100625
https://access.redhat.com/security/cve/CVE-2017-14130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22058
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14930 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14930
https://sourceware.org/bugzilla/show_bug.cgi?id=22191
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a26a013f22a19e2c16729e64f40ef8a7dfcc086e
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14932 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14932
https://sourceware.org/bugzilla/show_bug.cgi?id=22204
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14933 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101203
https://access.redhat.com/security/cve/CVE-2017-14933
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22210
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
binutils CVE-2017-14934 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101204
https://access.redhat.com/security/cve/CVE-2017-14934
https://sourceware.org/bugzilla/show_bug.cgi?id=22219
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b
binutils CVE-2017-14938 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101212
https://access.redhat.com/security/cve/CVE-2017-14938
https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14938
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14939 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101216
https://access.redhat.com/security/cve/CVE-2017-14939
https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14939
https://sourceware.org/bugzilla/show_bug.cgi?id=22169
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42970/
binutils CVE-2017-14940 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-14940
https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14940
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15020 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-15020
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020
https://sourceware.org/bugzilla/show_bug.cgi?id=22202
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15021 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-15021
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021
https://sourceware.org/bugzilla/show_bug.cgi?id=22197
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15022 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-15022
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022
https://sourceware.org/bugzilla/show_bug.cgi?id=22201
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15023 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101611
https://access.redhat.com/security/cve/CVE-2017-15023
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22200
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
binutils CVE-2017-15024 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-15024
https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024
https://sourceware.org/bugzilla/show_bug.cgi?id=22187
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15025 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-15025
https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025
https://sourceware.org/bugzilla/show_bug.cgi?id=22186
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15225 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-15225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15225
https://sourceware.org/bugzilla/show_bug.cgi?id=22212
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15938 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101610
https://access.redhat.com/security/cve/CVE-2017-15938
https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22209
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15996 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101608
https://access.redhat.com/security/cve/CVE-2017-15996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22361
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16826 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-16826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22376
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16827 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-16827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22306
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16828 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-16828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22386
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16829 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-16829
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22307
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163
binutils CVE-2017-16830 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/101941
https://access.redhat.com/security/cve/CVE-2017-16830
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22384
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
binutils CVE-2017-16831 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-16831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22385
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16832 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-16832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22373
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17080 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22421
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17121 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22506
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17122 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22508
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f
https://ubuntu.com/security/notices/USN-5341-1
binutils CVE-2017-17123 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22509
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17124 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22507
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17125 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22443
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17126 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-17126
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22510
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8
binutils CVE-2017-9038 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/98589
https://access.redhat.com/security/cve/CVE-2017-9038
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9039 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/98580
https://access.redhat.com/security/cve/CVE-2017-9039
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9040 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/98579
https://access.redhat.com/security/cve/CVE-2017-9040
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9041 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/98598
https://access.redhat.com/security/cve/CVE-2017-9041
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9042 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2017-9042
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9043 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/98591
https://access.redhat.com/security/cve/CVE-2017-9043
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
binutils CVE-2017-9044 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/98587
https://access.redhat.com/security/cve/CVE-2017-9044
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9742 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99105
https://access.redhat.com/security/cve/CVE-2017-9742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21576
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42203/
binutils CVE-2017-9743 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99106
https://access.redhat.com/security/cve/CVE-2017-9743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21577
binutils CVE-2017-9744 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99108
https://access.redhat.com/security/cve/CVE-2017-9744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744
https://sourceware.org/bugzilla/show_bug.cgi?id=21578
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9745 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99109
https://access.redhat.com/security/cve/CVE-2017-9745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745
https://sourceware.org/bugzilla/show_bug.cgi?id=21579
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9746 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99117
https://access.redhat.com/security/cve/CVE-2017-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21580
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42199/
binutils CVE-2017-9747 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99114
https://access.redhat.com/security/cve/CVE-2017-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747
https://sourceware.org/bugzilla/show_bug.cgi?id=21581
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42200/
binutils CVE-2017-9748 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99110
https://access.redhat.com/security/cve/CVE-2017-9748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748
https://sourceware.org/bugzilla/show_bug.cgi?id=21582
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42202/
binutils CVE-2017-9749 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99113
https://access.redhat.com/security/cve/CVE-2017-9749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21586
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42201/
binutils CVE-2017-9750 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99118
https://access.redhat.com/security/cve/CVE-2017-9750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21587
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42198/
binutils CVE-2017-9751 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99111
https://access.redhat.com/security/cve/CVE-2017-9751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21588
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9752 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99122
https://access.redhat.com/security/cve/CVE-2017-9752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752
https://sourceware.org/bugzilla/show_bug.cgi?id=21589
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9753 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99116
https://access.redhat.com/security/cve/CVE-2017-9753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9754 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99125
https://access.redhat.com/security/cve/CVE-2017-9754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9754
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9755 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99124
https://access.redhat.com/security/cve/CVE-2017-9755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21594
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9756 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/99103
https://access.redhat.com/security/cve/CVE-2017-9756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21595
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42204/
binutils CVE-2018-1000876 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://access.redhat.com/security/cve/CVE-2018-1000876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-12697 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://access.redhat.com/security/cve/CVE-2018-12697
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-12698 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/104539
https://access.redhat.com/security/cve/CVE-2018-12698
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-12699 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/104540
https://access.redhat.com/security/cve/CVE-2018-12699
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-12934 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2018-12934
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-13033 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/104584
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-13033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033
https://linux.oracle.com/cve/CVE-2018-13033.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23361
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17358 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17359 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17360 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17794 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2018-17794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17985 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18309 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://access.redhat.com/security/cve/CVE-2018-18309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18483 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://access.redhat.com/security/cve/CVE-2018-18483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18484 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://access.redhat.com/security/cve/CVE-2018-18484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18605 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18606 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18607 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18700 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2018-18700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18701 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2018-18701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-19931 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://access.redhat.com/security/cve/CVE-2018-19931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-19932 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://access.redhat.com/security/cve/CVE-2018-19932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20002 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/106142
https://access.redhat.com/security/cve/CVE-2018-20002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20623 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://access.redhat.com/security/cve/CVE-2018-20623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20651 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://access.redhat.com/security/cve/CVE-2018-20651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20671 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://access.redhat.com/security/cve/CVE-2018-20671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20673 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
binutils CVE-2018-20712 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/106563
https://access.redhat.com/security/cve/CVE-2018-20712
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
binutils CVE-2018-8945 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3032
https://access.redhat.com/security/cve/CVE-2018-8945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945
https://linux.oracle.com/cve/CVE-2018-8945.html
https://linux.oracle.com/errata/ELSA-2018-3032.html
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22809
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-9138 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2018-9138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-9996 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/103733
https://access.redhat.com/security/cve/CVE-2018-9996
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
binutils CVE-2019-1010180 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://access.redhat.com/security/cve/CVE-2019-1010180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://nvd.nist.gov/vuln/detail/CVE-2019-1010180
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
binutils CVE-2019-1010204 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
binutils CVE-2019-12972 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://access.redhat.com/security/cve/CVE-2019-12972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://nvd.nist.gov/vuln/detail/CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-14250 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-14444 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-14444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://nvd.nist.gov/vuln/detail/CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-17450 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17450
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-17451 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17451
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9070 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/107147
https://access.redhat.com/security/cve/CVE-2019-9070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://nvd.nist.gov/vuln/detail/CVE-2019-9070
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9071 LOW 2.28-5
Expand...http://www.securityfocus.com/bid/107147
https://access.redhat.com/security/cve/CVE-2019-9071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://nvd.nist.gov/vuln/detail/CVE-2019-9071
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9073 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2019-9073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://nvd.nist.gov/vuln/detail/CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9074 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://nvd.nist.gov/vuln/detail/CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9075 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://nvd.nist.gov/vuln/detail/CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9077 LOW 2.28-5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://access.redhat.com/security/cve/CVE-2019-9077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://nvd.nist.gov/vuln/detail/CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2020-16590 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-16590
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
binutils CVE-2020-16591 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-16591
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
binutils CVE-2020-16592 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-16592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
binutils CVE-2020-16593 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-16593
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
binutils CVE-2020-16599 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-16599
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
binutils CVE-2020-35448 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-35448
https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
binutils CVE-2020-35493 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-35493
https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35493
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35494 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-35494
https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35494
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35495 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-35495
https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35495
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35496 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-35496
https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35496
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35507 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2020-35507
https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://nvd.nist.gov/vuln/detail/CVE-2020-35507
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2021-20197 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-20197
https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20197
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
binutils CVE-2021-20284 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-20284
https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
binutils CVE-2021-20294 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-20294
https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-20294
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
binutils CVE-2021-3487 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-3487
https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3487
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
binutils CVE-2021-3530 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
binutils CVE-2021-3549 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-3549
https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
binutils CVE-2021-45078 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-45078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://nvd.nist.gov/vuln/detail/CVE-2021-45078
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
binutils CVE-2021-46195 LOW 2.28-5
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
bsdutils CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
bsdutils CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
bsdutils CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
bzip2 CVE-2019-12900 CRITICAL 1.0.6-8.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
ca-certificates DLA-2593-1 UNKNOWN 20200601~deb9u1 20200601~deb9u2
Expand...
comerr-dev CVE-2022-1304 HIGH 1.43.4-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
coreutils CVE-2016-2781 LOW 8.26-3
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
coreutils CVE-2017-18018 LOW 8.26-3
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
cpp-6 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
curl CVE-2021-22946 HIGH 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22876 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
curl CVE-2021-22947 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2022-22576 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27781 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2022-27782 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2021-22898 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2021-22922 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22923 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22924 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
debian-archive-keyring DLA-2948-1 UNKNOWN 2017.5+deb9u1 2017.5+deb9u2
Expand...
dirmngr CVE-2018-1000858 HIGH 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
dirmngr CVE-2018-9234 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
dirmngr CVE-2019-14855 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
dpkg CVE-2022-1664 MEDIUM 1.18.25 1.18.26
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
dpkg-dev CVE-2022-1664 MEDIUM 1.18.25 1.18.26
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
e2fslibs CVE-2022-1304 HIGH 1.43.4-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
e2fsprogs CVE-2022-1304 HIGH 1.43.4-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
file CVE-2019-8907 HIGH 1:5.30-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
https://access.redhat.com/security/cve/CVE-2019-8907
https://bugs.astron.com/view.php?id=65
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html
https://ubuntu.com/security/notices/USN-3911-1
https://usn.ubuntu.com/3911-1/
file CVE-2019-8905 MEDIUM 1:5.30-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
http://www.securityfocus.com/bid/107137
https://access.redhat.com/security/cve/CVE-2019-8905
https://bugs.astron.com/view.php?id=63
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html
https://ubuntu.com/security/notices/USN-3911-1
https://usn.ubuntu.com/3911-1/
g++-6 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
gcc-6 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
gcc-6-base CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
gir1.2-gdkpixbuf-2.0 CVE-2017-2870 LOW 2.36.5-2+deb9u2
Expand...http://www.securityfocus.com/bid/100541
https://access.redhat.com/security/cve/CVE-2017-2870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
https://ubuntu.com/security/notices/USN-3418-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
gir1.2-gdkpixbuf-2.0 CVE-2017-6311 LOW 2.36.5-2+deb9u2
Expand...http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
http://www.openwall.com/lists/oss-security/2017/02/21/4
http://www.openwall.com/lists/oss-security/2017/02/26/1
http://www.securityfocus.com/bid/96779
https://access.redhat.com/security/cve/CVE-2017-6311
https://bugzilla.gnome.org/show_bug.cgi?id=778204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
https://security.gentoo.org/glsa/201709-08
https://ubuntu.com/security/notices/USN-3418-1
git CVE-2021-21300 HIGH 1:2.11.0-3+deb9u7
Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
http://seclists.org/fulldisclosure/2021/Apr/60
http://www.openwall.com/lists/oss-security/2021/03/09/3
https://access.redhat.com/security/cve/CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks
https://git-scm.com/docs/gitattributes#_filter
https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592
https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/
https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/
https://security.gentoo.org/glsa/202104-01
https://support.apple.com/kb/HT212320
https://ubuntu.com/security/notices/USN-4761-1
git CVE-2021-40330 HIGH 1:2.11.0-3+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2021-40330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330
https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
https://github.com/git/git/compare/v2.30.0...v2.30.1
https://nvd.nist.gov/vuln/detail/CVE-2021-40330
https://ubuntu.com/security/notices/USN-5076-1
git CVE-2022-24765 HIGH 1:2.11.0-3+deb9u7
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
git CVE-2017-15298 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
git CVE-2018-1000021 LOW 1:2.11.0-3+deb9u7
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
git CVE-2019-1350 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2019-1350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350
https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://security.gentoo.org/glsa/202003-42
https://ubuntu.com/security/notices/USN-4220-1
git CVE-2019-1351 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2019-1351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351
https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
git CVE-2019-1354 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2019-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354
https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
git CVE-2022-24975 LOW 1:2.11.0-3+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2022-24975
https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191
https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
git-man CVE-2021-21300 HIGH 1:2.11.0-3+deb9u7
Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
http://seclists.org/fulldisclosure/2021/Apr/60
http://www.openwall.com/lists/oss-security/2021/03/09/3
https://access.redhat.com/security/cve/CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks
https://git-scm.com/docs/gitattributes#_filter
https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592
https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/
https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/
https://security.gentoo.org/glsa/202104-01
https://support.apple.com/kb/HT212320
https://ubuntu.com/security/notices/USN-4761-1
git-man CVE-2021-40330 HIGH 1:2.11.0-3+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2021-40330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330
https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
https://github.com/git/git/compare/v2.30.0...v2.30.1
https://nvd.nist.gov/vuln/detail/CVE-2021-40330
https://ubuntu.com/security/notices/USN-5076-1
git-man CVE-2022-24765 HIGH 1:2.11.0-3+deb9u7
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
git-man CVE-2017-15298 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
git-man CVE-2018-1000021 LOW 1:2.11.0-3+deb9u7
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
git-man CVE-2019-1350 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2019-1350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350
https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://security.gentoo.org/glsa/202003-42
https://ubuntu.com/security/notices/USN-4220-1
git-man CVE-2019-1351 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2019-1351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351
https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
git-man CVE-2019-1354 LOW 1:2.11.0-3+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2019-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354
https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
git-man CVE-2022-24975 LOW 1:2.11.0-3+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2022-24975
https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191
https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
gnupg CVE-2018-1000858 HIGH 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
gnupg CVE-2018-9234 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
gnupg CVE-2019-14855 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
gnupg-agent CVE-2018-1000858 HIGH 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
gnupg-agent CVE-2018-9234 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
gnupg-agent CVE-2019-14855 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
gpgv CVE-2018-1000858 HIGH 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
https://ubuntu.com/security/notices/USN-3853-1
https://usn.ubuntu.com/3853-1/
gpgv CVE-2018-9234 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
gpgv CVE-2019-14855 LOW 2.1.18-8~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
gzip CVE-2022-1271 HIGH 1.6-5 1.6-5+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
icu-devtools CVE-2020-21913 MEDIUM 57.1-6+deb9u4 57.1-6+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-21913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913
https://github.com/unicode-org/icu/pull/886
https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html
https://ubuntu.com/security/notices/USN-5133-1
https://unicode-org.atlassian.net/browse/ICU-20850
https://www.debian.org/security/2021/dsa-5014
imagemagick CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
imagemagick CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
imagemagick CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
imagemagick CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
imagemagick CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
imagemagick CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
imagemagick CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
imagemagick CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
imagemagick CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
imagemagick CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
imagemagick CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
imagemagick CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
imagemagick CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
imagemagick CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
imagemagick CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
imagemagick CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
imagemagick CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
imagemagick CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
imagemagick CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
imagemagick CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
imagemagick CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
imagemagick CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
imagemagick CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
imagemagick CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
imagemagick CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
imagemagick CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
imagemagick CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
imagemagick CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
imagemagick CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
imagemagick CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
imagemagick CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
imagemagick CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
imagemagick CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
imagemagick CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
imagemagick CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
imagemagick CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
imagemagick CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
imagemagick CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
imagemagick CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
imagemagick CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
imagemagick CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
imagemagick CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
imagemagick CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
imagemagick CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
imagemagick CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
imagemagick CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
imagemagick CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
imagemagick CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
imagemagick CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
imagemagick CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
imagemagick CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
imagemagick CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
imagemagick CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
imagemagick CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
imagemagick CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
imagemagick CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
imagemagick CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
imagemagick CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
imagemagick CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
imagemagick-6-common CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
imagemagick-6-common CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6-common CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6-common CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6-common CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
imagemagick-6-common CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6-common CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
imagemagick-6-common CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6-common CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
imagemagick-6-common CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
imagemagick-6-common CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
imagemagick-6-common CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
imagemagick-6-common CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
imagemagick-6-common CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
imagemagick-6-common CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
imagemagick-6-common CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
imagemagick-6-common CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
imagemagick-6-common CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
imagemagick-6-common CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
imagemagick-6-common CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
imagemagick-6-common CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
imagemagick-6-common CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
imagemagick-6-common CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
imagemagick-6-common CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
imagemagick-6-common CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
imagemagick-6-common CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
imagemagick-6-common CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
imagemagick-6-common CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
imagemagick-6-common CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
imagemagick-6-common CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
imagemagick-6-common CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
imagemagick-6-common CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
imagemagick-6-common CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
imagemagick-6-common CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
imagemagick-6-common CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
imagemagick-6-common CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
imagemagick-6-common CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
imagemagick-6-common CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
imagemagick-6-common CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
imagemagick-6-common CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
imagemagick-6-common CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
imagemagick-6-common CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
imagemagick-6-common CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
imagemagick-6-common CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
imagemagick-6-common CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
imagemagick-6-common CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
imagemagick-6-common CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
imagemagick-6-common CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
imagemagick-6-common CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
imagemagick-6-common CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
imagemagick-6-common CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
imagemagick-6-common CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
imagemagick-6-common CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
imagemagick-6-common CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
imagemagick-6-common CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
imagemagick-6-common CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
imagemagick-6-common CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6-common CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6-common CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6-common CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6-common CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6-common CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6-common CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6-common CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6-common CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
imagemagick-6-common CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6-common CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6-common CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6-common CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
imagemagick-6-common CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
imagemagick-6-common CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
imagemagick-6-common CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
imagemagick-6-common CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
imagemagick-6-common CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6-common CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6-common CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6-common CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
imagemagick-6.q16 CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
imagemagick-6.q16 CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6.q16 CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6.q16 CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6.q16 CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
imagemagick-6.q16 CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6.q16 CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
imagemagick-6.q16 CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
imagemagick-6.q16 CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
imagemagick-6.q16 CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
imagemagick-6.q16 CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
imagemagick-6.q16 CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
imagemagick-6.q16 CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
imagemagick-6.q16 CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
imagemagick-6.q16 CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
imagemagick-6.q16 CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
imagemagick-6.q16 CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
imagemagick-6.q16 CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
imagemagick-6.q16 CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
imagemagick-6.q16 CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
imagemagick-6.q16 CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
imagemagick-6.q16 CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
imagemagick-6.q16 CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
imagemagick-6.q16 CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
imagemagick-6.q16 CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
imagemagick-6.q16 CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
imagemagick-6.q16 CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
imagemagick-6.q16 CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
imagemagick-6.q16 CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
imagemagick-6.q16 CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
imagemagick-6.q16 CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
imagemagick-6.q16 CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
imagemagick-6.q16 CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
imagemagick-6.q16 CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
imagemagick-6.q16 CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
imagemagick-6.q16 CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
imagemagick-6.q16 CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
imagemagick-6.q16 CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
imagemagick-6.q16 CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
imagemagick-6.q16 CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
imagemagick-6.q16 CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
imagemagick-6.q16 CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
imagemagick-6.q16 CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
imagemagick-6.q16 CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
imagemagick-6.q16 CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
imagemagick-6.q16 CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
imagemagick-6.q16 CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
imagemagick-6.q16 CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
imagemagick-6.q16 CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
imagemagick-6.q16 CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
imagemagick-6.q16 CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
imagemagick-6.q16 CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
imagemagick-6.q16 CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
imagemagick-6.q16 CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
imagemagick-6.q16 CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
imagemagick-6.q16 CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
imagemagick-6.q16 CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6.q16 CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6.q16 CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6.q16 CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6.q16 CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6.q16 CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
imagemagick-6.q16 CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6.q16 CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6.q16 CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
imagemagick-6.q16 CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6.q16 CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
imagemagick-6.q16 CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
imagemagick-6.q16 CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
imagemagick-6.q16 CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
imagemagick-6.q16 CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
imagemagick-6.q16 CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
imagemagick-6.q16 CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
imagemagick-6.q16 CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
imagemagick-6.q16 CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
imagemagick-6.q16 CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
imagemagick-6.q16 CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
krb5-multidev CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
krb5-multidev CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
krb5-multidev CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
krb5-multidev CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
krb5-multidev CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
krb5-multidev CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
krb5-multidev CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
krb5-multidev CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
krb5-multidev CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libapr1 CVE-2017-12613 HIGH 1.5.2-5 1.5.2-5+deb9u1
Expand...http://www.apache.org/dist/apr/Announcement1.x.html
http://www.openwall.com/lists/oss-security/2021/08/23/1
http://www.securityfocus.com/bid/101560
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2017:3270
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/errata/RHSA-2018:0316
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1253
https://access.redhat.com/security/cve/CVE-2017-12613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613
https://linux.oracle.com/cve/CVE-2017-12613.html
https://linux.oracle.com/errata/ELSA-2017-3270.html
https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E
https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E
https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E
https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html
https://svn.apache.org/viewvc?view=revision&revision=1807976
libaprutil1 CVE-2017-12618 LOW 1.5.4-3
Expand...http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E
http://www.apache.org/dist/apr/Announcement1.x.html
http://www.securityfocus.com/bid/101558
http://www.securitytracker.com/id/1042004
https://access.redhat.com/security/cve/CVE-2017-12618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12618
https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html
libapt-pkg5.0 CVE-2011-3374 LOW 1.4.11
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
libasan3 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libatomic1 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libavahi-client3 CVE-2021-26720 HIGH 0.6.32-2
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824
https://bugzilla.suse.com/show_bug.cgi?id=1180827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720
https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog
https://nvd.nist.gov/vuln/detail/CVE-2021-26720
https://packages.debian.org/bullseye/avahi-daemon
https://packages.debian.org/buster/avahi-daemon
https://packages.debian.org/sid/avahi-daemon
https://security-tracker.debian.org/tracker/CVE-2021-26720
https://www.openwall.com/lists/oss-security/2021/02/15/2
libavahi-client3 CVE-2021-3468 MEDIUM 0.6.32-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3468
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://nvd.nist.gov/vuln/detail/CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
libavahi-client3 CVE-2017-6519 LOW 0.6.32-2
Expand...https://access.redhat.com/security/cve/CVE-2017-6519
https://bugzilla.redhat.com/show_bug.cgi?id=1426712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519
https://github.com/lathiat/avahi/issues/203
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
https://linux.oracle.com/cve/CVE-2017-6519.html
https://linux.oracle.com/errata/ELSA-2020-1176.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-6519
https://ubuntu.com/security/notices/USN-3876-1
https://ubuntu.com/security/notices/USN-3876-2
https://usn.ubuntu.com/3876-1/
https://usn.ubuntu.com/3876-2/
https://www.kb.cert.org/vuls/id/550620
https://www.secfu.net/advisories
libavahi-common-data CVE-2021-26720 HIGH 0.6.32-2
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824
https://bugzilla.suse.com/show_bug.cgi?id=1180827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720
https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog
https://nvd.nist.gov/vuln/detail/CVE-2021-26720
https://packages.debian.org/bullseye/avahi-daemon
https://packages.debian.org/buster/avahi-daemon
https://packages.debian.org/sid/avahi-daemon
https://security-tracker.debian.org/tracker/CVE-2021-26720
https://www.openwall.com/lists/oss-security/2021/02/15/2
libavahi-common-data CVE-2021-3468 MEDIUM 0.6.32-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3468
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://nvd.nist.gov/vuln/detail/CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
libavahi-common-data CVE-2017-6519 LOW 0.6.32-2
Expand...https://access.redhat.com/security/cve/CVE-2017-6519
https://bugzilla.redhat.com/show_bug.cgi?id=1426712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519
https://github.com/lathiat/avahi/issues/203
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
https://linux.oracle.com/cve/CVE-2017-6519.html
https://linux.oracle.com/errata/ELSA-2020-1176.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-6519
https://ubuntu.com/security/notices/USN-3876-1
https://ubuntu.com/security/notices/USN-3876-2
https://usn.ubuntu.com/3876-1/
https://usn.ubuntu.com/3876-2/
https://www.kb.cert.org/vuls/id/550620
https://www.secfu.net/advisories
libavahi-common3 CVE-2021-26720 HIGH 0.6.32-2
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824
https://bugzilla.suse.com/show_bug.cgi?id=1180827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720
https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog
https://nvd.nist.gov/vuln/detail/CVE-2021-26720
https://packages.debian.org/bullseye/avahi-daemon
https://packages.debian.org/buster/avahi-daemon
https://packages.debian.org/sid/avahi-daemon
https://security-tracker.debian.org/tracker/CVE-2021-26720
https://www.openwall.com/lists/oss-security/2021/02/15/2
libavahi-common3 CVE-2021-3468 MEDIUM 0.6.32-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3468
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://nvd.nist.gov/vuln/detail/CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
libavahi-common3 CVE-2017-6519 LOW 0.6.32-2
Expand...https://access.redhat.com/security/cve/CVE-2017-6519
https://bugzilla.redhat.com/show_bug.cgi?id=1426712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519
https://github.com/lathiat/avahi/issues/203
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
https://linux.oracle.com/cve/CVE-2017-6519.html
https://linux.oracle.com/errata/ELSA-2020-1176.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-6519
https://ubuntu.com/security/notices/USN-3876-1
https://ubuntu.com/security/notices/USN-3876-2
https://usn.ubuntu.com/3876-1/
https://usn.ubuntu.com/3876-2/
https://www.kb.cert.org/vuls/id/550620
https://www.secfu.net/advisories
libblkid1 CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
libblkid1 CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libblkid1 CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libbsd0 CVE-2019-20367 CRITICAL 0.8.3-1 0.8.3-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367
https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b
https://lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550@%3Cdev.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00027.html
https://lists.freedesktop.org/archives/libbsd/2019-August/000229.html
https://ubuntu.com/security/notices/USN-4243-1
https://usn.ubuntu.com/4243-1/
libbz2-1.0 CVE-2019-12900 CRITICAL 1.0.6-8.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
libbz2-dev CVE-2019-12900 CRITICAL 1.0.6-8.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
libc-bin CVE-2018-6485 CRITICAL 2.24-11+deb9u4
Expand...http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
libc-bin CVE-2018-6551 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
libc-bin CVE-2019-9169 CRITICAL 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2021-33574 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-bin CVE-2021-35942 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-bin CVE-2022-23218 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2022-23219 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2009-5155 HIGH 2.24-11+deb9u4
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
libc-bin CVE-2018-1000001 HIGH 2.24-11+deb9u4
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
libc-bin CVE-2020-1751 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2020-1752 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2021-3326 HIGH 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2021-3999 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-bin CVE-2016-10739 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
libc-bin CVE-2017-12132 MEDIUM 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
libc-bin CVE-2019-25013 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2020-10029 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2020-27618 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2010-4756 LOW 2.24-11+deb9u4
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc-bin CVE-2015-8985 LOW 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
libc-bin CVE-2016-10228 LOW 2.24-11+deb9u4
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2018-20796 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-bin CVE-2019-1010022 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc-bin CVE-2019-1010023 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc-bin CVE-2019-1010024 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc-bin CVE-2019-1010025 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc-bin CVE-2019-19126 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-bin CVE-2019-6488 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
libc-bin CVE-2019-7309 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
libc-bin CVE-2019-9192 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-bin CVE-2020-6096 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-bin CVE-2021-27645 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc-dev-bin CVE-2018-6485 CRITICAL 2.24-11+deb9u4
Expand...http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
libc-dev-bin CVE-2018-6551 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
libc-dev-bin CVE-2019-9169 CRITICAL 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-dev-bin CVE-2021-33574 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-dev-bin CVE-2021-35942 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-dev-bin CVE-2022-23218 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-dev-bin CVE-2022-23219 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-dev-bin CVE-2009-5155 HIGH 2.24-11+deb9u4
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
libc-dev-bin CVE-2018-1000001 HIGH 2.24-11+deb9u4
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
libc-dev-bin CVE-2020-1751 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-dev-bin CVE-2020-1752 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-dev-bin CVE-2021-3326 HIGH 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-dev-bin CVE-2021-3999 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-dev-bin CVE-2016-10739 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
libc-dev-bin CVE-2017-12132 MEDIUM 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
libc-dev-bin CVE-2019-25013 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-dev-bin CVE-2020-10029 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-dev-bin CVE-2020-27618 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-dev-bin CVE-2010-4756 LOW 2.24-11+deb9u4
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc-dev-bin CVE-2015-8985 LOW 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
libc-dev-bin CVE-2016-10228 LOW 2.24-11+deb9u4
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-dev-bin CVE-2018-20796 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-dev-bin CVE-2019-1010022 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc-dev-bin CVE-2019-1010023 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc-dev-bin CVE-2019-1010024 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc-dev-bin CVE-2019-1010025 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc-dev-bin CVE-2019-19126 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc-dev-bin CVE-2019-6488 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
libc-dev-bin CVE-2019-7309 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
libc-dev-bin CVE-2019-9192 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc-dev-bin CVE-2020-6096 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-dev-bin CVE-2021-27645 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2018-6485 CRITICAL 2.24-11+deb9u4
Expand...http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
libc6 CVE-2018-6551 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
libc6 CVE-2019-9169 CRITICAL 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2021-33574 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc6 CVE-2021-35942 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2022-23218 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2022-23219 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2009-5155 HIGH 2.24-11+deb9u4
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
libc6 CVE-2018-1000001 HIGH 2.24-11+deb9u4
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
libc6 CVE-2020-1751 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2020-1752 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2021-3326 HIGH 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2021-3999 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc6 CVE-2016-10739 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
libc6 CVE-2017-12132 MEDIUM 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
libc6 CVE-2019-25013 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2020-10029 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2020-27618 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2010-4756 LOW 2.24-11+deb9u4
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc6 CVE-2015-8985 LOW 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
libc6 CVE-2016-10228 LOW 2.24-11+deb9u4
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2018-20796 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6 CVE-2019-1010022 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc6 CVE-2019-1010023 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc6 CVE-2019-1010024 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc6 CVE-2019-1010025 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc6 CVE-2019-19126 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6 CVE-2019-6488 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
libc6 CVE-2019-7309 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
libc6 CVE-2019-9192 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6 CVE-2020-6096 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc6 CVE-2021-27645 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc6-dev CVE-2018-6485 CRITICAL 2.24-11+deb9u4
Expand...http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
libc6-dev CVE-2018-6551 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
libc6-dev CVE-2019-9169 CRITICAL 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6-dev CVE-2021-33574 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc6-dev CVE-2021-35942 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc6-dev CVE-2022-23218 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6-dev CVE-2022-23219 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6-dev CVE-2009-5155 HIGH 2.24-11+deb9u4
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
libc6-dev CVE-2018-1000001 HIGH 2.24-11+deb9u4
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
libc6-dev CVE-2020-1751 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6-dev CVE-2020-1752 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6-dev CVE-2021-3326 HIGH 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6-dev CVE-2021-3999 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc6-dev CVE-2016-10739 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
libc6-dev CVE-2017-12132 MEDIUM 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
libc6-dev CVE-2019-25013 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6-dev CVE-2020-10029 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6-dev CVE-2020-27618 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6-dev CVE-2010-4756 LOW 2.24-11+deb9u4
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
libc6-dev CVE-2015-8985 LOW 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
libc6-dev CVE-2016-10228 LOW 2.24-11+deb9u4
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6-dev CVE-2018-20796 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6-dev CVE-2019-1010022 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
libc6-dev CVE-2019-1010023 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
libc6-dev CVE-2019-1010024 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
libc6-dev CVE-2019-1010025 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
libc6-dev CVE-2019-19126 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
libc6-dev CVE-2019-6488 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
libc6-dev CVE-2019-7309 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
libc6-dev CVE-2019-9192 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
libc6-dev CVE-2020-6096 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc6-dev CVE-2021-27645 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libcairo-gobject2 CVE-2017-7475 LOW 1.14.8-1+deb9u1
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
libcairo-gobject2 CVE-2017-9814 LOW 1.14.8-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://access.redhat.com/security/cve/CVE-2017-9814
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
https://ubuntu.com/security/notices/USN-5407-1
libcairo-gobject2 CVE-2018-18064 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libcairo-gobject2 CVE-2019-6461 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
libcairo-gobject2 CVE-2019-6462 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
libcairo-script-interpreter2 CVE-2017-7475 LOW 1.14.8-1+deb9u1
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
libcairo-script-interpreter2 CVE-2017-9814 LOW 1.14.8-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://access.redhat.com/security/cve/CVE-2017-9814
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
https://ubuntu.com/security/notices/USN-5407-1
libcairo-script-interpreter2 CVE-2018-18064 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libcairo-script-interpreter2 CVE-2019-6461 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
libcairo-script-interpreter2 CVE-2019-6462 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
libcairo2 CVE-2017-7475 LOW 1.14.8-1+deb9u1
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
libcairo2 CVE-2017-9814 LOW 1.14.8-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://access.redhat.com/security/cve/CVE-2017-9814
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
https://ubuntu.com/security/notices/USN-5407-1
libcairo2 CVE-2018-18064 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libcairo2 CVE-2019-6461 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
libcairo2 CVE-2019-6462 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
libcairo2-dev CVE-2017-7475 LOW 1.14.8-1+deb9u1
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
libcairo2-dev CVE-2017-9814 LOW 1.14.8-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://access.redhat.com/security/cve/CVE-2017-9814
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
https://ubuntu.com/security/notices/USN-5407-1
libcairo2-dev CVE-2018-18064 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libcairo2-dev CVE-2019-6461 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
libcairo2-dev CVE-2019-6462 LOW 1.14.8-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
libcc1-0 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libcdt5 CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libcdt5 CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libcdt5 CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libcdt5 CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libcgraph6 CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libcgraph6 CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libcgraph6 CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libcgraph6 CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libcilkrts5 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libcomerr2 CVE-2022-1304 HIGH 1.43.4-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libcroco3 CVE-2017-8834 LOW 0.6.11-3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
http://seclists.org/fulldisclosure/2017/Jun/10
http://www.openwall.com/lists/oss-security/2020/08/13/3
https://access.redhat.com/security/cve/CVE-2017-8834
https://bugzilla.gnome.org/show_bug.cgi?id=782647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834
https://ubuntu.com/security/notices/USN-5389-1
https://www.exploit-db.com/exploits/42147/
libcroco3 CVE-2017-8871 LOW 0.6.11-3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
http://seclists.org/fulldisclosure/2017/Jun/10
http://www.openwall.com/lists/oss-security/2020/08/13/3
https://access.redhat.com/security/cve/CVE-2017-8871
https://bugzilla.gnome.org/show_bug.cgi?id=782649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871
https://ubuntu.com/security/notices/USN-5389-1
https://www.exploit-db.com/exploits/42147/
libcroco3 CVE-2020-12825 LOW 0.6.11-3
Expand...http://www.openwall.com/lists/oss-security/2020/08/13/3
http://www.openwall.com/lists/oss-security/2020/09/08/3
https://access.redhat.com/security/cve/CVE-2020-12825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825
https://errata.almalinux.org/8/ALSA-2020-3654.html
https://gitlab.gnome.org/GNOME/libcroco/-/issues/8
https://linux.oracle.com/cve/CVE-2020-12825.html
https://linux.oracle.com/errata/ELSA-2020-4072.html
https://ubuntu.com/security/notices/USN-5389-1
libcups2 CVE-2020-10001 MEDIUM 2.2.1-8+deb9u6 2.2.1-8+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2020-10001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
https://linux.oracle.com/cve/CVE-2020-10001.html
https://linux.oracle.com/errata/ELSA-2021-4393.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html
https://support.apple.com/en-us/HT212011
libcups2 CVE-2014-8166 LOW 2.2.1-8+deb9u6
Expand...http://www.openwall.com/lists/oss-security/2015/03/24/15
http://www.openwall.com/lists/oss-security/2015/03/24/2
http://www.securityfocus.com/bid/73300
https://access.redhat.com/security/cve/CVE-2014-8166
https://bugzilla.redhat.com/show_bug.cgi?id=1084577
libcups2 CVE-2022-26691 UNKNOWN 2.2.1-8+deb9u6
Expand...
libcurl3 CVE-2021-22946 HIGH 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3 CVE-2021-22876 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
libcurl3 CVE-2021-22947 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3 CVE-2022-22576 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl3 CVE-2022-27774 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl3 CVE-2022-27776 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl3 CVE-2022-27781 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
libcurl3 CVE-2022-27782 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
libcurl3 CVE-2021-22898 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl3 CVE-2021-22922 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3 CVE-2021-22923 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3 CVE-2021-22924 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3-gnutls CVE-2021-22946 HIGH 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3-gnutls CVE-2021-22876 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
libcurl3-gnutls CVE-2021-22947 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3-gnutls CVE-2022-22576 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl3-gnutls CVE-2022-27774 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl3-gnutls CVE-2022-27776 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl3-gnutls CVE-2022-27781 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
libcurl3-gnutls CVE-2022-27782 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
libcurl3-gnutls CVE-2021-22898 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl3-gnutls CVE-2021-22922 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3-gnutls CVE-2021-22923 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3-gnutls CVE-2021-22924 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4-openssl-dev CVE-2021-22946 HIGH 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4-openssl-dev CVE-2021-22876 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
libcurl4-openssl-dev CVE-2021-22947 MEDIUM 7.52.1-5+deb9u13 7.52.1-5+deb9u16
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4-openssl-dev CVE-2022-22576 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl4-openssl-dev CVE-2022-27774 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl4-openssl-dev CVE-2022-27776 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl4-openssl-dev CVE-2022-27781 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
libcurl4-openssl-dev CVE-2022-27782 MEDIUM 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
libcurl4-openssl-dev CVE-2021-22898 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl4-openssl-dev CVE-2021-22922 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4-openssl-dev CVE-2021-22923 LOW 7.52.1-5+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4-openssl-dev CVE-2021-22924 LOW 7.52.1-5+deb9u13 7.52.1-5+deb9u15
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libdb5.3 CVE-2019-8457 CRITICAL 5.3.28-12+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libdb5.3-dev CVE-2019-8457 CRITICAL 5.3.28-12+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libdjvulibre-dev CVE-2019-18804 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804
https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md
https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/
https://sourceforge.net/p/djvu/bugs/309/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2021-32490 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2021-32491 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943409
https://bugzilla.redhat.com/show_bug.cgi?id=1943684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2021-32492 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2021-32493 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2021-3500 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2019-15142 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/296/
https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2019-15143 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/297/
https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2019-15144 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/299/
https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2019-15145 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/298/
https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-dev CVE-2021-3630 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u2
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1977427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630
https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/
https://sourceforge.net/p/djvu/bugs/302/
https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/
https://ubuntu.com/security/notices/USN-5005-1
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2019-18804 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804
https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md
https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/
https://sourceforge.net/p/djvu/bugs/309/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2021-32490 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2021-32491 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943409
https://bugzilla.redhat.com/show_bug.cgi?id=1943684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2021-32492 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2021-32493 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2021-3500 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2019-15142 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/296/
https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2019-15143 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/297/
https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2019-15144 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/299/
https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2019-15145 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/298/
https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre-text CVE-2021-3630 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u2
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1977427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630
https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/
https://sourceforge.net/p/djvu/bugs/302/
https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/
https://ubuntu.com/security/notices/USN-5005-1
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2019-18804 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804
https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md
https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/
https://sourceforge.net/p/djvu/bugs/309/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2021-32490 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2021-32491 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943409
https://bugzilla.redhat.com/show_bug.cgi?id=1943684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2021-32492 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2021-32493 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2021-3500 HIGH 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500
https://ubuntu.com/security/notices/USN-4957-1
https://ubuntu.com/security/notices/USN-4957-2
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2019-15142 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/296/
https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2019-15143 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/297/
https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2019-15144 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/299/
https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2019-15145 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145
https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/
https://security.gentoo.org/glsa/202007-36
https://sourceforge.net/p/djvu/bugs/298/
https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/
https://ubuntu.com/security/notices/USN-4198-1
https://usn.ubuntu.com/4198-1/
https://www.debian.org/security/2021/dsa-5032
libdjvulibre21 CVE-2021-3630 MEDIUM 3.5.27.1-7 3.5.27.1-7+deb9u2
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1977427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630
https://lists.debian.org/debian-lts-announce/2021/07/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MRXCW4BUGAJLGF6IWQWUZ2YBICMZCPK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIZIAJWGKI26DKDOGJS7J7CIQGHHMIHG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3B4QZCICPZRDXA2HOIACSQNZB2VEHSM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVKYWV4P5XGA3FXKGFB443MKC32L7YQB/
https://sourceforge.net/p/djvu/bugs/302/
https://sourceforge.net/p/djvu/djvulibre-git/ci/7b0ef20690e08f1fe124aebbf42f6310e2f40f81/
https://ubuntu.com/security/notices/USN-5005-1
https://www.debian.org/security/2021/dsa-5032
libdpkg-perl CVE-2022-1664 MEDIUM 1.18.25 1.18.26
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
libelf1 CVE-2018-16402 CRITICAL 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/security/cve/CVE-2018-16402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402
https://linux.oracle.com/cve/CVE-2018-16402.html
https://linux.oracle.com/errata/ELSA-2019-2197.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23528
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2018-16062 MEDIUM 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/security/cve/CVE-2018-16062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062
https://linux.oracle.com/cve/CVE-2018-16062.html
https://linux.oracle.com/errata/ELSA-2019-2197.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23541
https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2018-18310 MEDIUM 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/security/cve/CVE-2018-18310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310
https://linux.oracle.com/cve/CVE-2018-18310.html
https://linux.oracle.com/errata/ELSA-2019-2197.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23752
https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2018-18520 MEDIUM 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/security/cve/CVE-2018-18520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520
https://linux.oracle.com/cve/CVE-2018-18520.html
https://linux.oracle.com/errata/ELSA-2019-2197.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23787
https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2018-18521 MEDIUM 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/security/cve/CVE-2018-18521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521
https://linux.oracle.com/cve/CVE-2018-18521.html
https://linux.oracle.com/errata/ELSA-2019-2197.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23786
https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2019-7150 MEDIUM 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/errata/RHSA-2019:3575
https://access.redhat.com/security/cve/CVE-2019-7150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150
https://linux.oracle.com/cve/CVE-2019-7150.html
https://linux.oracle.com/errata/ELSA-2019-3575.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24103
https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2019-7665 MEDIUM 0.168-1 0.168-1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/errata/RHSA-2019:3575
https://access.redhat.com/security/cve/CVE-2019-7665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665
https://linux.oracle.com/cve/CVE-2019-7665.html
https://linux.oracle.com/errata/ELSA-2019-3575.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24089
https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2018-16403 LOW 0.168-1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/security/cve/CVE-2018-16403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403
https://linux.oracle.com/cve/CVE-2018-16403.html
https://linux.oracle.com/errata/ELSA-2019-2197.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23529
https://sourceware.org/git/?p=elfutils.git;a=commit;h=6983e59b727458a6c64d9659c85f08218bc4fcda
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libelf1 CVE-2019-7148 LOW 0.168-1
Expand...https://access.redhat.com/security/cve/CVE-2019-7148
https://sourceware.org/bugzilla/show_bug.cgi?id=24085
libelf1 CVE-2019-7149 LOW 0.168-1
Expand...https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/errata/RHSA-2019:3575
https://access.redhat.com/security/cve/CVE-2019-7149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149
https://linux.oracle.com/cve/CVE-2019-7149.html
https://linux.oracle.com/errata/ELSA-2019-3575.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24102
https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
https://ubuntu.com/security/notices/USN-4012-1
https://usn.ubuntu.com/4012-1/
libexpat1 CVE-2022-22822 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22822
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22823 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22823
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22824 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22824
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-23852 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-23852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23852
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-23990 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://nvd.nist.gov/vuln/detail/CVE-2022-23990
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-25235 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25235
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2022-25236 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25236
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2022-25315 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25315
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25315
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2021-45960 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-45960
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45960
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2021-46143 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-46143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46143
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22825 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22825
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22826 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22826
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22827 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22827
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-25313 MEDIUM 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25313
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25313
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2013-0340 LOW 2.2.0-2+deb9u3
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
libexpat1-dev CVE-2022-22822 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22822
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-22823 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22823
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-22824 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22824
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-23852 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-23852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23852
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-23990 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://nvd.nist.gov/vuln/detail/CVE-2022-23990
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-25235 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25235
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1-dev CVE-2022-25236 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25236
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1-dev CVE-2022-25315 CRITICAL 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25315
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25315
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1-dev CVE-2021-45960 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-45960
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45960
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2021-46143 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-46143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46143
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-22825 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22825
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-22826 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22826
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-22827 HIGH 2.2.0-2+deb9u3 2.2.0-2+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22827
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1-dev CVE-2022-25313 MEDIUM 2.2.0-2+deb9u3 2.2.0-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25313
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25313
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1-dev CVE-2013-0340 LOW 2.2.0-2+deb9u3
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
libfdisk1 CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
libfdisk1 CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libfdisk1 CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libfreetype6 CVE-2022-27404 CRITICAL 2.6.3-3.2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
libfreetype6 CVE-2022-27405 HIGH 2.6.3-3.2+deb9u2
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
libfreetype6 CVE-2022-27406 HIGH 2.6.3-3.2+deb9u2
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
libfreetype6-dev CVE-2022-27404 CRITICAL 2.6.3-3.2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
libfreetype6-dev CVE-2022-27405 HIGH 2.6.3-3.2+deb9u2
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
libfreetype6-dev CVE-2022-27406 HIGH 2.6.3-3.2+deb9u2
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
libgcc-6-dev CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libgcc1 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libgcrypt20 CVE-2021-33560 HIGH 1.7.6-2+deb9u3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libgcrypt20 CVE-2019-13627 MEDIUM 1.7.6-2+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
libgcrypt20 CVE-2021-40528 MEDIUM 1.7.6-2+deb9u3 1.7.6-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-40528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://nvd.nist.gov/vuln/detail/CVE-2021-40528
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
libgcrypt20 CVE-2018-6829 LOW 1.7.6-2+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
libgd3 CVE-2017-6363 HIGH 2.2.4-2+deb9u5
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363
https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c
https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397
https://github.com/libgd/libgd/issues/383
https://ubuntu.com/security/notices/USN-5068-1
libgd3 CVE-2021-40145 HIGH 2.2.4-2+deb9u5
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145
https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af
https://github.com/libgd/libgd/issues/700
https://github.com/libgd/libgd/pull/713
https://nvd.nist.gov/vuln/detail/CVE-2021-40145
https://ubuntu.com/security/notices/USN-5068-1
libgd3 CVE-2021-38115 MEDIUM 2.2.4-2+deb9u5
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115
https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032
https://github.com/libgd/libgd/issues/697
https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032
https://nvd.nist.gov/vuln/detail/CVE-2021-38115
https://ubuntu.com/security/notices/USN-5068-1
libgd3 CVE-2021-40812 MEDIUM 2.2.4-2+deb9u5
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812
https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
https://github.com/libgd/libgd/issues/750#issuecomment-914872385
https://github.com/libgd/libgd/issues/757
https://nvd.nist.gov/vuln/detail/CVE-2021-40812
libgd3 CVE-2018-14553 LOW 2.2.4-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html
https://access.redhat.com/security/cve/CVE-2018-14553
https://bugzilla.redhat.com/show_bug.cgi?id=1599032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f
https://github.com/libgd/libgd/pull/580
https://linux.oracle.com/cve/CVE-2018-14553.html
https://linux.oracle.com/errata/ELSA-2020-4659.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
https://ubuntu.com/security/notices/USN-4316-1
https://ubuntu.com/security/notices/USN-4316-2
https://usn.ubuntu.com/4316-1/
https://usn.ubuntu.com/4316-2/
libgdk-pixbuf2.0-0 CVE-2017-2870 LOW 2.36.5-2+deb9u2
Expand...http://www.securityfocus.com/bid/100541
https://access.redhat.com/security/cve/CVE-2017-2870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
https://ubuntu.com/security/notices/USN-3418-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
libgdk-pixbuf2.0-0 CVE-2017-6311 LOW 2.36.5-2+deb9u2
Expand...http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
http://www.openwall.com/lists/oss-security/2017/02/21/4
http://www.openwall.com/lists/oss-security/2017/02/26/1
http://www.securityfocus.com/bid/96779
https://access.redhat.com/security/cve/CVE-2017-6311
https://bugzilla.gnome.org/show_bug.cgi?id=778204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
https://security.gentoo.org/glsa/201709-08
https://ubuntu.com/security/notices/USN-3418-1
libgdk-pixbuf2.0-common CVE-2017-2870 LOW 2.36.5-2+deb9u2
Expand...http://www.securityfocus.com/bid/100541
https://access.redhat.com/security/cve/CVE-2017-2870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
https://ubuntu.com/security/notices/USN-3418-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
libgdk-pixbuf2.0-common CVE-2017-6311 LOW 2.36.5-2+deb9u2
Expand...http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
http://www.openwall.com/lists/oss-security/2017/02/21/4
http://www.openwall.com/lists/oss-security/2017/02/26/1
http://www.securityfocus.com/bid/96779
https://access.redhat.com/security/cve/CVE-2017-6311
https://bugzilla.gnome.org/show_bug.cgi?id=778204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
https://security.gentoo.org/glsa/201709-08
https://ubuntu.com/security/notices/USN-3418-1
libgdk-pixbuf2.0-dev CVE-2017-2870 LOW 2.36.5-2+deb9u2
Expand...http://www.securityfocus.com/bid/100541
https://access.redhat.com/security/cve/CVE-2017-2870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
https://ubuntu.com/security/notices/USN-3418-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
libgdk-pixbuf2.0-dev CVE-2017-6311 LOW 2.36.5-2+deb9u2
Expand...http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
http://www.openwall.com/lists/oss-security/2017/02/21/4
http://www.openwall.com/lists/oss-security/2017/02/26/1
http://www.securityfocus.com/bid/96779
https://access.redhat.com/security/cve/CVE-2017-6311
https://bugzilla.gnome.org/show_bug.cgi?id=778204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
https://security.gentoo.org/glsa/201709-08
https://ubuntu.com/security/notices/USN-3418-1
libglib2.0-0 CVE-2021-27218 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-0 CVE-2021-27219 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
https://gitlab.gnome.org/GNOME/glib/-/issues/2319
https://linux.oracle.com/cve/CVE-2021-27219.html
https://linux.oracle.com/errata/ELSA-2021-9318.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27219
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-0 CVE-2021-28153 MEDIUM 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-28153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
libglib2.0-0 CVE-2012-0039 LOW 2.50.3-2+deb9u2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
libglib2.0-0 CVE-2020-35457 LOW 2.50.3-2+deb9u2
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
https://nvd.nist.gov/vuln/detail/CVE-2020-35457
libglib2.0-bin CVE-2021-27218 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-bin CVE-2021-27219 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
https://gitlab.gnome.org/GNOME/glib/-/issues/2319
https://linux.oracle.com/cve/CVE-2021-27219.html
https://linux.oracle.com/errata/ELSA-2021-9318.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27219
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-bin CVE-2021-28153 MEDIUM 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-28153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
libglib2.0-bin CVE-2012-0039 LOW 2.50.3-2+deb9u2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
libglib2.0-bin CVE-2020-35457 LOW 2.50.3-2+deb9u2
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
https://nvd.nist.gov/vuln/detail/CVE-2020-35457
libglib2.0-data CVE-2021-27218 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-data CVE-2021-27219 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
https://gitlab.gnome.org/GNOME/glib/-/issues/2319
https://linux.oracle.com/cve/CVE-2021-27219.html
https://linux.oracle.com/errata/ELSA-2021-9318.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27219
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-data CVE-2021-28153 MEDIUM 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-28153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
libglib2.0-data CVE-2012-0039 LOW 2.50.3-2+deb9u2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
libglib2.0-data CVE-2020-35457 LOW 2.50.3-2+deb9u2
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
https://nvd.nist.gov/vuln/detail/CVE-2020-35457
libglib2.0-dev CVE-2021-27218 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-dev CVE-2021-27219 HIGH 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-27219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
https://gitlab.gnome.org/GNOME/glib/-/issues/2319
https://linux.oracle.com/cve/CVE-2021-27219.html
https://linux.oracle.com/errata/ELSA-2021-9318.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27219
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
libglib2.0-dev CVE-2021-28153 MEDIUM 2.50.3-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-28153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
libglib2.0-dev CVE-2012-0039 LOW 2.50.3-2+deb9u2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
libglib2.0-dev CVE-2020-35457 LOW 2.50.3-2+deb9u2
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
https://nvd.nist.gov/vuln/detail/CVE-2020-35457
libgmp-dev CVE-2021-43618 HIGH 2:6.1.2+dfsg-1 2:6.1.2+dfsg-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
libgmp10 CVE-2021-43618 HIGH 2:6.1.2+dfsg-1 2:6.1.2+dfsg-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
libgmpxx4ldbl CVE-2021-43618 HIGH 2:6.1.2+dfsg-1 2:6.1.2+dfsg-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
libgnutls30 CVE-2018-16868 MEDIUM 3.5.8-5+deb9u5
Expand...http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
libgnutls30 CVE-2021-4209 MEDIUM 3.5.8-5+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
libgnutls30 CVE-2011-3389 LOW 3.5.8-5+deb9u5
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
libgnutls30 DLA-2759-1 UNKNOWN 3.5.8-5+deb9u5 3.5.8-5+deb9u6
Expand...
libgomp1 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libgraphite2-3 CVE-2018-7999 HIGH 1.3.10-1
Expand...https://access.redhat.com/security/cve/CVE-2018-7999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7999
https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6
https://github.com/silnrsi/graphite/issues/22
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5F3CK2IPXFCLQZEBEEXONWIABN2E7H2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWOKYZZDEMG6VSG53KAGUOHUIIQ7CND/
libgraphviz-dev CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libgraphviz-dev CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libgraphviz-dev CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libgraphviz-dev CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libgssapi-krb5-2 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libgssapi-krb5-2 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libgssapi-krb5-2 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libgssapi-krb5-2 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libgssapi-krb5-2 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libgssapi-krb5-2 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libgssapi-krb5-2 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libgssapi-krb5-2 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libgssapi-krb5-2 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libgssrpc4 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libgssrpc4 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libgssrpc4 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libgssrpc4 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libgssrpc4 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libgssrpc4 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libgssrpc4 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libgssrpc4 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libgssrpc4 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libgvc6 CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libgvc6 CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libgvc6 CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libgvc6 CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libgvc6-plugins-gtk CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libgvc6-plugins-gtk CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libgvc6-plugins-gtk CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libgvc6-plugins-gtk CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libgvpr2 CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libgvpr2 CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libgvpr2 CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libgvpr2 CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libhogweed4 CVE-2021-20305 HIGH 3.3-1 3.3-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-20305
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
https://linux.oracle.com/cve/CVE-2021-20305.html
https://linux.oracle.com/errata/ELSA-2021-1206.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
https://security.gentoo.org/glsa/202105-31
https://security.netapp.com/advisory/ntap-20211022-0002/
https://ubuntu.com/security/notices/USN-4906-1
https://www.debian.org/security/2021/dsa-4933
libhogweed4 CVE-2021-3580 HIGH 3.3-1 3.3-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
libhogweed4 CVE-2018-16869 MEDIUM 3.3-1
Expand...http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://ubuntu.com/security/notices/USN-4990-1
libicu-dev CVE-2020-21913 MEDIUM 57.1-6+deb9u4 57.1-6+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-21913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913
https://github.com/unicode-org/icu/pull/886
https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html
https://ubuntu.com/security/notices/USN-5133-1
https://unicode-org.atlassian.net/browse/ICU-20850
https://www.debian.org/security/2021/dsa-5014
libicu57 CVE-2020-21913 MEDIUM 57.1-6+deb9u4 57.1-6+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-21913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913
https://github.com/unicode-org/icu/pull/886
https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html
https://ubuntu.com/security/notices/USN-5133-1
https://unicode-org.atlassian.net/browse/ICU-20850
https://www.debian.org/security/2021/dsa-5014
libitm1 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libjbig-dev CVE-2017-9937 LOW 2.1-3.1
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libjbig0 CVE-2017-9937 LOW 2.1-3.1
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libjpeg-dev CVE-2017-15232 LOW 1:1.5.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2017-15232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
libjpeg-dev CVE-2018-11813 LOW 1:1.5.1-2+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://access.redhat.com/security/cve/CVE-2018-11813
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
libjpeg-dev CVE-2019-2201 LOW 1:1.5.1-2+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html
https://access.redhat.com/security/cve/CVE-2019-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201
https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/
https://security.gentoo.org/glsa/202003-23
https://source.android.com/security/bulletin/2019-11-01
https://ubuntu.com/security/notices/USN-4190-1
https://usn.ubuntu.com/4190-1/
libjpeg-dev CVE-2020-17541 LOW 1:1.5.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-17541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17541
libjpeg62-turbo CVE-2017-15232 LOW 1:1.5.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2017-15232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
libjpeg62-turbo CVE-2018-11813 LOW 1:1.5.1-2+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://access.redhat.com/security/cve/CVE-2018-11813
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
libjpeg62-turbo CVE-2019-2201 LOW 1:1.5.1-2+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html
https://access.redhat.com/security/cve/CVE-2019-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201
https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/
https://security.gentoo.org/glsa/202003-23
https://source.android.com/security/bulletin/2019-11-01
https://ubuntu.com/security/notices/USN-4190-1
https://usn.ubuntu.com/4190-1/
libjpeg62-turbo CVE-2020-17541 LOW 1:1.5.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-17541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17541
libjpeg62-turbo-dev CVE-2017-15232 LOW 1:1.5.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2017-15232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
libjpeg62-turbo-dev CVE-2018-11813 LOW 1:1.5.1-2+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://access.redhat.com/security/cve/CVE-2018-11813
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
libjpeg62-turbo-dev CVE-2019-2201 LOW 1:1.5.1-2+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html
https://access.redhat.com/security/cve/CVE-2019-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201
https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280@%3Ccommits.mxnet.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/
https://security.gentoo.org/glsa/202003-23
https://source.android.com/security/bulletin/2019-11-01
https://ubuntu.com/security/notices/USN-4190-1
https://usn.ubuntu.com/4190-1/
libjpeg62-turbo-dev CVE-2020-17541 LOW 1:1.5.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-17541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17541
libjs-jquery CVE-2020-11022 MEDIUM 3.1.1-2+deb9u1 3.1.1-2+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html
https://access.redhat.com/security/cve/CVE-2020-11022
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77
https://github.com/jquery/jquery/releases/tag/3.5.0
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://jquery.com/upgrade-guide/3.5/
https://linux.oracle.com/cve/CVE-2020-11022.html
https://linux.oracle.com/errata/ELSA-2022-9177.html
https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/
https://nvd.nist.gov/vuln/detail/CVE-2020-11022
https://security.gentoo.org/glsa/202007-03
https://security.netapp.com/advisory/ntap-20200511-0006/
https://www.debian.org/security/2020/dsa-4693
https://www.drupal.org/sa-core-2020-002
https://www.npmjs.com/advisories/1518
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-10
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-02
https://www.tenable.com/security/tns-2021-10
libjs-jquery CVE-2020-11023 MEDIUM 3.1.1-2+deb9u1 3.1.1-2+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
https://access.redhat.com/security/cve/CVE-2020-11023
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/jquery/jquery/releases/tag/3.5.0
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440
https://jquery.com/upgrade-guide/3.5/
https://linux.oracle.com/cve/CVE-2020-11023.html
https://linux.oracle.com/errata/ELSA-2022-9177.html
https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E
https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
https://nvd.nist.gov/vuln/detail/CVE-2020-11023
https://security.gentoo.org/glsa/202007-03
https://security.netapp.com/advisory/ntap-20200511-0006/
https://www.debian.org/security/2020/dsa-4693
https://www.drupal.org/sa-core-2020-002
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-02
https://www.tenable.com/security/tns-2021-10
libjs-jquery CVE-2007-2379 LOW 3.1.1-2+deb9u1
Expand...http://osvdb.org/43320
http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf
https://security.netapp.com/advisory/ntap-20190416-0007/
libjs-jquery CVE-2018-18405 LOW 3.1.1-2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-18405
https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4
https://gitter.im/jquery/jquery?at=5ea844a05cd4fe50a3d7ddc9
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/
https://twitter.com/DanielRufde/status/1255185961866145792
libk5crypto3 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libk5crypto3 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libk5crypto3 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libk5crypto3 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libk5crypto3 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libk5crypto3 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libk5crypto3 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libk5crypto3 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libk5crypto3 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkadm5clnt-mit11 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libkadm5clnt-mit11 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libkadm5clnt-mit11 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkadm5clnt-mit11 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkadm5clnt-mit11 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkadm5clnt-mit11 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkadm5clnt-mit11 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkadm5clnt-mit11 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkadm5clnt-mit11 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkadm5srv-mit11 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libkadm5srv-mit11 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libkadm5srv-mit11 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkadm5srv-mit11 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkadm5srv-mit11 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkadm5srv-mit11 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkadm5srv-mit11 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkadm5srv-mit11 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkadm5srv-mit11 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkdb5-8 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libkdb5-8 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libkdb5-8 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkdb5-8 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkdb5-8 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkdb5-8 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkdb5-8 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkdb5-8 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkdb5-8 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5-3 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libkrb5-3 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libkrb5-3 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5-3 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkrb5-3 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5-3 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkrb5-3 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkrb5-3 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5-3 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5-dev CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libkrb5-dev CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libkrb5-dev CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5-dev CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkrb5-dev CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5-dev CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkrb5-dev CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkrb5-dev CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5-dev CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5support0 CVE-2018-20217 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
libkrb5support0 CVE-2018-5710 MEDIUM 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
libkrb5support0 CVE-2018-5729 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5support0 CVE-2021-37750 MEDIUM 1.15-1+deb9u2 1.15-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkrb5support0 CVE-2004-0971 LOW 1.15-1+deb9u2
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
libkrb5support0 CVE-2017-11462 LOW 1.15-1+deb9u2
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkrb5support0 CVE-2017-15088 LOW 1.15-1+deb9u2
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkrb5support0 CVE-2018-5709 LOW 1.15-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libkrb5support0 CVE-2018-5730 LOW 1.15-1+deb9u2 1.15-1+deb9u3
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libldap-2.4-2 CVE-2022-29155 CRITICAL 2.4.44+dfsg-5+deb9u7 2.4.44+dfsg-5+deb9u9
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
libldap-2.4-2 CVE-2021-27212 HIGH 2.4.44+dfsg-5+deb9u7 2.4.44+dfsg-5+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.debian.org/security/2021/dsa-4860
libldap-2.4-2 CVE-2015-3276 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
libldap-2.4-2 CVE-2017-14159 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.4-2 CVE-2017-17740 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.4-2 CVE-2020-15719 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2022-29155 CRITICAL 2.4.44+dfsg-5+deb9u7 2.4.44+dfsg-5+deb9u9
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
libldap-common CVE-2021-27212 HIGH 2.4.44+dfsg-5+deb9u7 2.4.44+dfsg-5+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.debian.org/security/2021/dsa-4860
libldap-common CVE-2015-3276 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
libldap-common CVE-2017-14159 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2017-17740 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common CVE-2020-15719 LOW 2.4.44+dfsg-5+deb9u7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
liblsan0 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
liblz4-1 CVE-2021-3520 CRITICAL 0.0~r131-2 0.0~r131-2+deb9u1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json
https://access.redhat.com/security/cve/CVE-2021-3520
https://bugzilla.redhat.com/show_bug.cgi?id=1954559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
https://errata.almalinux.org/8/ALSA-2021-2575.html
https://github.com/lz4/lz4/pull/972
https://linux.oracle.com/cve/CVE-2021-3520.html
https://linux.oracle.com/errata/ELSA-2021-2575.html
https://security.netapp.com/advisory/ntap-20211104-0005/
https://ubuntu.com/security/notices/USN-4968-1
https://ubuntu.com/security/notices/USN-4968-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
liblz4-1 CVE-2019-17543 LOW 0.0~r131-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
liblzma-dev CVE-2022-1271 HIGH 5.2.2-1.2 5.2.2-1.2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
liblzma5 CVE-2022-1271 HIGH 5.2.2-1.2 5.2.2-1.2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
libmagic-mgc CVE-2019-8907 HIGH 1:5.30-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
https://access.redhat.com/security/cve/CVE-2019-8907
https://bugs.astron.com/view.php?id=65
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html
https://ubuntu.com/security/notices/USN-3911-1
https://usn.ubuntu.com/3911-1/
libmagic-mgc CVE-2019-8905 MEDIUM 1:5.30-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
http://www.securityfocus.com/bid/107137
https://access.redhat.com/security/cve/CVE-2019-8905
https://bugs.astron.com/view.php?id=63
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html
https://ubuntu.com/security/notices/USN-3911-1
https://usn.ubuntu.com/3911-1/
libmagic1 CVE-2019-8907 HIGH 1:5.30-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
https://access.redhat.com/security/cve/CVE-2019-8907
https://bugs.astron.com/view.php?id=65
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html
https://ubuntu.com/security/notices/USN-3911-1
https://usn.ubuntu.com/3911-1/
libmagic1 CVE-2019-8905 MEDIUM 1:5.30-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
http://www.securityfocus.com/bid/107137
https://access.redhat.com/security/cve/CVE-2019-8905
https://bugs.astron.com/view.php?id=63
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html
https://ubuntu.com/security/notices/USN-3911-1
https://usn.ubuntu.com/3911-1/
libmagickcore-6-arch-config CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickcore-6-arch-config CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-arch-config CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-arch-config CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-arch-config CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6-arch-config CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-arch-config CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickcore-6-arch-config CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-arch-config CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6-arch-config CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickcore-6-arch-config CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickcore-6-arch-config CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickcore-6-arch-config CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickcore-6-arch-config CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickcore-6-arch-config CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickcore-6-arch-config CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickcore-6-arch-config CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickcore-6-arch-config CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickcore-6-arch-config CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickcore-6-arch-config CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickcore-6-arch-config CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickcore-6-arch-config CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-arch-config CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickcore-6-arch-config CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickcore-6-arch-config CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickcore-6-arch-config CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickcore-6-arch-config CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-arch-config CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickcore-6-arch-config CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickcore-6-arch-config CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickcore-6-arch-config CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickcore-6-arch-config CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickcore-6-arch-config CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickcore-6-arch-config CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickcore-6-arch-config CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickcore-6-arch-config CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickcore-6-arch-config CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickcore-6-arch-config CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickcore-6-arch-config CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickcore-6-arch-config CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickcore-6-arch-config CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickcore-6-arch-config CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickcore-6-arch-config CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickcore-6-arch-config CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickcore-6-arch-config CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickcore-6-arch-config CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-arch-config CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-arch-config CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-arch-config CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-arch-config CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickcore-6-arch-config CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickcore-6-arch-config CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickcore-6-arch-config CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickcore-6-arch-config CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickcore-6-arch-config CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickcore-6-arch-config CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickcore-6-arch-config CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-arch-config CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-arch-config CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-arch-config CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-arch-config CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-arch-config CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-arch-config CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-arch-config CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-arch-config CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickcore-6-arch-config CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-arch-config CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-arch-config CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-arch-config CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickcore-6-arch-config CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickcore-6-arch-config CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6-arch-config CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6-arch-config CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickcore-6-arch-config CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-arch-config CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-arch-config CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-arch-config CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickcore-6-headers CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickcore-6-headers CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-headers CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-headers CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-headers CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6-headers CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-headers CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickcore-6-headers CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6-headers CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6-headers CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickcore-6-headers CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickcore-6-headers CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickcore-6-headers CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickcore-6-headers CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickcore-6-headers CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickcore-6-headers CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickcore-6-headers CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickcore-6-headers CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickcore-6-headers CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickcore-6-headers CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickcore-6-headers CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickcore-6-headers CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-headers CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickcore-6-headers CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickcore-6-headers CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickcore-6-headers CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickcore-6-headers CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-headers CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickcore-6-headers CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickcore-6-headers CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickcore-6-headers CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickcore-6-headers CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickcore-6-headers CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickcore-6-headers CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickcore-6-headers CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickcore-6-headers CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickcore-6-headers CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickcore-6-headers CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickcore-6-headers CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickcore-6-headers CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickcore-6-headers CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickcore-6-headers CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickcore-6-headers CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickcore-6-headers CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickcore-6-headers CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickcore-6-headers CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-headers CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-headers CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-headers CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickcore-6-headers CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickcore-6-headers CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickcore-6-headers CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickcore-6-headers CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickcore-6-headers CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickcore-6-headers CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickcore-6-headers CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickcore-6-headers CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-headers CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-headers CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-headers CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-headers CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-headers CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6-headers CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-headers CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-headers CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickcore-6-headers CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-headers CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6-headers CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6-headers CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickcore-6-headers CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickcore-6-headers CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6-headers CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6-headers CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickcore-6-headers CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6-headers CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6-headers CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6-headers CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickcore-6.q16-3 CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickcore-6.q16-3 CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3 CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3 CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3 CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6.q16-3 CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3 CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickcore-6.q16-3 CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3 CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6.q16-3 CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickcore-6.q16-3 CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickcore-6.q16-3 CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickcore-6.q16-3 CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickcore-6.q16-3 CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickcore-6.q16-3 CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickcore-6.q16-3 CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickcore-6.q16-3 CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickcore-6.q16-3 CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickcore-6.q16-3 CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickcore-6.q16-3 CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickcore-6.q16-3 CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickcore-6.q16-3 CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3 CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickcore-6.q16-3 CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickcore-6.q16-3 CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickcore-6.q16-3 CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickcore-6.q16-3 CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3 CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickcore-6.q16-3 CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickcore-6.q16-3 CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickcore-6.q16-3 CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickcore-6.q16-3 CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickcore-6.q16-3 CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickcore-6.q16-3 CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickcore-6.q16-3 CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickcore-6.q16-3 CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickcore-6.q16-3 CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickcore-6.q16-3 CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickcore-6.q16-3 CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickcore-6.q16-3 CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickcore-6.q16-3 CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickcore-6.q16-3 CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickcore-6.q16-3 CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickcore-6.q16-3 CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickcore-6.q16-3 CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickcore-6.q16-3 CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3 CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3 CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3 CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3 CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickcore-6.q16-3 CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickcore-6.q16-3 CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickcore-6.q16-3 CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickcore-6.q16-3 CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickcore-6.q16-3 CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickcore-6.q16-3 CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3 CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3 CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3 CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3 CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3 CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3 CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3 CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3 CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3 CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickcore-6.q16-3 CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3 CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3 CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3 CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickcore-6.q16-3 CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickcore-6.q16-3 CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6.q16-3 CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6.q16-3 CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickcore-6.q16-3 CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3 CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3 CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3 CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickcore-6.q16-3-extra CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickcore-6.q16-3-extra CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3-extra CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3-extra CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3-extra CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6.q16-3-extra CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3-extra CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickcore-6.q16-3-extra CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-3-extra CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6.q16-3-extra CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickcore-6.q16-3-extra CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickcore-6.q16-3-extra CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickcore-6.q16-3-extra CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickcore-6.q16-3-extra CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickcore-6.q16-3-extra CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickcore-6.q16-3-extra CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickcore-6.q16-3-extra CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickcore-6.q16-3-extra CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickcore-6.q16-3-extra CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickcore-6.q16-3-extra CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickcore-6.q16-3-extra CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickcore-6.q16-3-extra CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3-extra CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickcore-6.q16-3-extra CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickcore-6.q16-3-extra CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickcore-6.q16-3-extra CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickcore-6.q16-3-extra CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3-extra CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickcore-6.q16-3-extra CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickcore-6.q16-3-extra CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickcore-6.q16-3-extra CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickcore-6.q16-3-extra CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickcore-6.q16-3-extra CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickcore-6.q16-3-extra CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickcore-6.q16-3-extra CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickcore-6.q16-3-extra CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickcore-6.q16-3-extra CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickcore-6.q16-3-extra CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickcore-6.q16-3-extra CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickcore-6.q16-3-extra CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickcore-6.q16-3-extra CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickcore-6.q16-3-extra CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickcore-6.q16-3-extra CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickcore-6.q16-3-extra CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickcore-6.q16-3-extra CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickcore-6.q16-3-extra CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3-extra CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3-extra CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3-extra CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-3-extra CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickcore-6.q16-3-extra CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickcore-6.q16-3-extra CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickcore-6.q16-3-extra CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickcore-6.q16-3-extra CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickcore-6.q16-3-extra CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickcore-6.q16-3-extra CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3-extra CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3-extra CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3-extra CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3-extra CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3-extra CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3-extra CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-3-extra CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3-extra CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3-extra CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickcore-6.q16-3-extra CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3-extra CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-3-extra CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-3-extra CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickcore-6.q16-3-extra CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickcore-6.q16-3-extra CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6.q16-3-extra CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6.q16-3-extra CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickcore-6.q16-3-extra CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-3-extra CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-3-extra CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-3-extra CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickcore-6.q16-dev CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickcore-6.q16-dev CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-dev CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-dev CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-dev CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6.q16-dev CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-dev CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickcore-6.q16-dev CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-6.q16-dev CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-6.q16-dev CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickcore-6.q16-dev CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickcore-6.q16-dev CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickcore-6.q16-dev CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickcore-6.q16-dev CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickcore-6.q16-dev CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickcore-6.q16-dev CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickcore-6.q16-dev CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickcore-6.q16-dev CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickcore-6.q16-dev CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickcore-6.q16-dev CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickcore-6.q16-dev CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickcore-6.q16-dev CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-dev CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickcore-6.q16-dev CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickcore-6.q16-dev CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickcore-6.q16-dev CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickcore-6.q16-dev CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-dev CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickcore-6.q16-dev CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickcore-6.q16-dev CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickcore-6.q16-dev CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickcore-6.q16-dev CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickcore-6.q16-dev CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickcore-6.q16-dev CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickcore-6.q16-dev CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickcore-6.q16-dev CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickcore-6.q16-dev CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickcore-6.q16-dev CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickcore-6.q16-dev CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickcore-6.q16-dev CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickcore-6.q16-dev CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickcore-6.q16-dev CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickcore-6.q16-dev CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickcore-6.q16-dev CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickcore-6.q16-dev CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickcore-6.q16-dev CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-dev CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-dev CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-dev CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickcore-6.q16-dev CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickcore-6.q16-dev CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickcore-6.q16-dev CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickcore-6.q16-dev CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickcore-6.q16-dev CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickcore-6.q16-dev CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickcore-6.q16-dev CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-dev CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-dev CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-dev CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-dev CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-dev CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-dev CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-6.q16-dev CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-dev CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-dev CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickcore-6.q16-dev CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-dev CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-6.q16-dev CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-6.q16-dev CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickcore-6.q16-dev CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickcore-6.q16-dev CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6.q16-dev CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-6.q16-dev CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickcore-6.q16-dev CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-6.q16-dev CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-6.q16-dev CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-6.q16-dev CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickcore-dev CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickcore-dev CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-dev CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-dev CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-dev CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-dev CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-dev CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickcore-dev CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickcore-dev CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickcore-dev CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickcore-dev CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickcore-dev CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickcore-dev CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickcore-dev CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickcore-dev CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickcore-dev CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickcore-dev CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickcore-dev CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickcore-dev CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickcore-dev CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickcore-dev CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickcore-dev CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickcore-dev CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickcore-dev CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickcore-dev CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickcore-dev CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickcore-dev CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickcore-dev CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickcore-dev CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickcore-dev CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickcore-dev CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickcore-dev CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickcore-dev CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickcore-dev CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickcore-dev CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickcore-dev CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickcore-dev CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickcore-dev CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickcore-dev CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickcore-dev CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickcore-dev CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickcore-dev CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickcore-dev CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickcore-dev CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickcore-dev CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickcore-dev CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickcore-dev CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickcore-dev CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickcore-dev CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickcore-dev CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickcore-dev CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickcore-dev CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickcore-dev CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickcore-dev CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickcore-dev CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickcore-dev CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickcore-dev CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-dev CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-dev CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-dev CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-dev CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-dev CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickcore-dev CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-dev CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-dev CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickcore-dev CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-dev CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickcore-dev CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickcore-dev CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickcore-dev CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickcore-dev CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-dev CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickcore-dev CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickcore-dev CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickcore-dev CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickcore-dev CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickcore-dev CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickwand-6-headers CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickwand-6-headers CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6-headers CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6-headers CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6-headers CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-6-headers CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6-headers CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickwand-6-headers CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6-headers CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-6-headers CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickwand-6-headers CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickwand-6-headers CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickwand-6-headers CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickwand-6-headers CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickwand-6-headers CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickwand-6-headers CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickwand-6-headers CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickwand-6-headers CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickwand-6-headers CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickwand-6-headers CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickwand-6-headers CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickwand-6-headers CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickwand-6-headers CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickwand-6-headers CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickwand-6-headers CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickwand-6-headers CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickwand-6-headers CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickwand-6-headers CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickwand-6-headers CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickwand-6-headers CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickwand-6-headers CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickwand-6-headers CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickwand-6-headers CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickwand-6-headers CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickwand-6-headers CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickwand-6-headers CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickwand-6-headers CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickwand-6-headers CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickwand-6-headers CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickwand-6-headers CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickwand-6-headers CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickwand-6-headers CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickwand-6-headers CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickwand-6-headers CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickwand-6-headers CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickwand-6-headers CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickwand-6-headers CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickwand-6-headers CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickwand-6-headers CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickwand-6-headers CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickwand-6-headers CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickwand-6-headers CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickwand-6-headers CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickwand-6-headers CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickwand-6-headers CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickwand-6-headers CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickwand-6-headers CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6-headers CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6-headers CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6-headers CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6-headers CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6-headers CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6-headers CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6-headers CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6-headers CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickwand-6-headers CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6-headers CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6-headers CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6-headers CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickwand-6-headers CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickwand-6-headers CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-6-headers CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-6-headers CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickwand-6-headers CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6-headers CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6-headers CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6-headers CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickwand-6.q16-3 CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickwand-6.q16-3 CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-3 CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-3 CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-3 CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-6.q16-3 CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-3 CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickwand-6.q16-3 CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-3 CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-6.q16-3 CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickwand-6.q16-3 CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickwand-6.q16-3 CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickwand-6.q16-3 CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickwand-6.q16-3 CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickwand-6.q16-3 CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickwand-6.q16-3 CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickwand-6.q16-3 CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickwand-6.q16-3 CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickwand-6.q16-3 CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickwand-6.q16-3 CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickwand-6.q16-3 CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickwand-6.q16-3 CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-3 CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickwand-6.q16-3 CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickwand-6.q16-3 CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickwand-6.q16-3 CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickwand-6.q16-3 CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-3 CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickwand-6.q16-3 CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickwand-6.q16-3 CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickwand-6.q16-3 CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickwand-6.q16-3 CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickwand-6.q16-3 CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickwand-6.q16-3 CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickwand-6.q16-3 CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickwand-6.q16-3 CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickwand-6.q16-3 CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickwand-6.q16-3 CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickwand-6.q16-3 CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickwand-6.q16-3 CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickwand-6.q16-3 CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickwand-6.q16-3 CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickwand-6.q16-3 CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickwand-6.q16-3 CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickwand-6.q16-3 CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickwand-6.q16-3 CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-3 CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-3 CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-3 CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-3 CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickwand-6.q16-3 CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickwand-6.q16-3 CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickwand-6.q16-3 CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickwand-6.q16-3 CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickwand-6.q16-3 CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickwand-6.q16-3 CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-3 CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-3 CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-3 CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-3 CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-3 CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-3 CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-3 CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-3 CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-3 CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickwand-6.q16-3 CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-3 CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-3 CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-3 CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickwand-6.q16-3 CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickwand-6.q16-3 CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-6.q16-3 CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-6.q16-3 CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickwand-6.q16-3 CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-3 CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-3 CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-3 CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickwand-6.q16-dev CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickwand-6.q16-dev CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-dev CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-dev CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-dev CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-6.q16-dev CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-dev CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickwand-6.q16-dev CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-6.q16-dev CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-6.q16-dev CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickwand-6.q16-dev CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickwand-6.q16-dev CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickwand-6.q16-dev CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickwand-6.q16-dev CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickwand-6.q16-dev CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickwand-6.q16-dev CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickwand-6.q16-dev CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickwand-6.q16-dev CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickwand-6.q16-dev CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickwand-6.q16-dev CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickwand-6.q16-dev CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickwand-6.q16-dev CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-dev CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickwand-6.q16-dev CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickwand-6.q16-dev CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickwand-6.q16-dev CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickwand-6.q16-dev CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-dev CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickwand-6.q16-dev CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickwand-6.q16-dev CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickwand-6.q16-dev CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickwand-6.q16-dev CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickwand-6.q16-dev CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickwand-6.q16-dev CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickwand-6.q16-dev CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickwand-6.q16-dev CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickwand-6.q16-dev CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickwand-6.q16-dev CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickwand-6.q16-dev CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickwand-6.q16-dev CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickwand-6.q16-dev CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickwand-6.q16-dev CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickwand-6.q16-dev CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickwand-6.q16-dev CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickwand-6.q16-dev CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickwand-6.q16-dev CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-dev CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-dev CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-dev CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickwand-6.q16-dev CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickwand-6.q16-dev CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickwand-6.q16-dev CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickwand-6.q16-dev CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickwand-6.q16-dev CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickwand-6.q16-dev CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickwand-6.q16-dev CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-dev CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-dev CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-dev CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-dev CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-dev CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-dev CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-6.q16-dev CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-dev CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-dev CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickwand-6.q16-dev CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-dev CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-6.q16-dev CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-6.q16-dev CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickwand-6.q16-dev CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickwand-6.q16-dev CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-6.q16-dev CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-6.q16-dev CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickwand-6.q16-dev CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-6.q16-dev CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-6.q16-dev CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-6.q16-dev CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmagickwand-dev CVE-2020-27752 HIGH 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
libmagickwand-dev CVE-2020-27766 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27766
https://bugzilla.redhat.com/show_bug.cgi?id=1894686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2021-20309 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-dev CVE-2021-20312 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-dev CVE-2021-20313 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-dev CVE-2022-28463 HIGH 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2022-28463
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
https://github.com/ImageMagick/ImageMagick/issues/4988
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-dev CVE-2020-25664 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2020-25676 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25676
https://bugzilla.redhat.com/show_bug.cgi?id=1891934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2020-27762 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27762
https://bugzilla.redhat.com/show_bug.cgi?id=1894680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2020-27770 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27770
https://bugzilla.redhat.com/show_bug.cgi?id=1894691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2021-20176 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20176
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2021-20241 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2021-20243 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2021-20244 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-dev CVE-2021-20245 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
libmagickwand-dev CVE-2021-20246 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
libmagickwand-dev CVE-2021-3596 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u14
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
libmagickwand-dev CVE-2021-39212 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
libmagickwand-dev CVE-2021-4219 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-4219
https://bugzilla.redhat.com/show_bug.cgi?id=2054611
libmagickwand-dev CVE-2022-1115 MEDIUM 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2022-1115
libmagickwand-dev CVE-2005-0406 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
libmagickwand-dev CVE-2008-3134 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://access.redhat.com/security/cve/CVE-2008-3134
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
libmagickwand-dev CVE-2016-8678 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://access.redhat.com/security/cve/CVE-2016-8678
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
libmagickwand-dev CVE-2017-11531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99998
https://access.redhat.com/security/cve/CVE-2017-11531
https://github.com/ImageMagick/ImageMagick/issues/566
libmagickwand-dev CVE-2017-11532 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11532
https://github.com/ImageMagick/ImageMagick/issues/563
libmagickwand-dev CVE-2017-11534 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11534
https://github.com/ImageMagick/ImageMagick/issues/564
libmagickwand-dev CVE-2017-11536 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100000
https://access.redhat.com/security/cve/CVE-2017-11536
https://github.com/ImageMagick/ImageMagick/issues/567
libmagickwand-dev CVE-2017-11539 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/99936
https://access.redhat.com/security/cve/CVE-2017-11539
https://github.com/ImageMagick/ImageMagick/issues/582
libmagickwand-dev CVE-2017-11644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100014
https://access.redhat.com/security/cve/CVE-2017-11644
https://github.com/ImageMagick/ImageMagick/issues/587
libmagickwand-dev CVE-2017-11724 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104597
https://access.redhat.com/security/cve/CVE-2017-11724
https://github.com/ImageMagick/ImageMagick/issues/624
https://security.gentoo.org/glsa/201711-07
libmagickwand-dev CVE-2017-11751 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11751
https://github.com/ImageMagick/ImageMagick/issues/631
libmagickwand-dev CVE-2017-11752 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11752
https://github.com/ImageMagick/ImageMagick/issues/628
libmagickwand-dev CVE-2017-11754 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11754
https://github.com/ImageMagick/ImageMagick/issues/633
libmagickwand-dev CVE-2017-11755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-11755
https://github.com/ImageMagick/ImageMagick/issues/634
libmagickwand-dev CVE-2017-12418 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
https://github.com/ImageMagick/ImageMagick/issues/643
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-12427 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12427
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
https://security.gentoo.org/glsa/201711-07
libmagickwand-dev CVE-2017-12433 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
https://github.com/ImageMagick/ImageMagick/issues/548
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-12564 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100161
https://access.redhat.com/security/cve/CVE-2017-12564
https://github.com/ImageMagick/ImageMagick/issues/601
libmagickwand-dev CVE-2017-12565 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100156
https://access.redhat.com/security/cve/CVE-2017-12565
https://github.com/ImageMagick/ImageMagick/issues/602
libmagickwand-dev CVE-2017-12566 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12566
https://github.com/ImageMagick/ImageMagick/issues/603
libmagickwand-dev CVE-2017-12641 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12641
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
libmagickwand-dev CVE-2017-12642 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100159
https://access.redhat.com/security/cve/CVE-2017-12642
https://github.com/ImageMagick/ImageMagick/issues/552
libmagickwand-dev CVE-2017-12644 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100162
https://access.redhat.com/security/cve/CVE-2017-12644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-12654 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100230
https://access.redhat.com/security/cve/CVE-2017-12654
https://github.com/ImageMagick/ImageMagick/issues/620
libmagickwand-dev CVE-2017-12662 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100232
https://access.redhat.com/security/cve/CVE-2017-12662
https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829
https://github.com/ImageMagick/ImageMagick/issues/576
libmagickwand-dev CVE-2017-12663 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12663
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
libmagickwand-dev CVE-2017-12664 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12664
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
libmagickwand-dev CVE-2017-12665 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12665
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
libmagickwand-dev CVE-2017-12666 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100226
https://access.redhat.com/security/cve/CVE-2017-12666
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
libmagickwand-dev CVE-2017-12667 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12667
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
libmagickwand-dev CVE-2017-12668 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12668
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
libmagickwand-dev CVE-2017-12669 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12669
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
libmagickwand-dev CVE-2017-12670 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100252
https://access.redhat.com/security/cve/CVE-2017-12670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
https://github.com/ImageMagick/ImageMagick/issues/610
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-12672 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100224
https://access.redhat.com/security/cve/CVE-2017-12672
https://github.com/ImageMagick/ImageMagick/issues/617
libmagickwand-dev CVE-2017-12673 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100228
https://access.redhat.com/security/cve/CVE-2017-12673
https://github.com/ImageMagick/ImageMagick/issues/619
libmagickwand-dev CVE-2017-12675 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-12675
https://github.com/ImageMagick/ImageMagick/issues/616
libmagickwand-dev CVE-2017-12676 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100225
https://access.redhat.com/security/cve/CVE-2017-12676
https://github.com/ImageMagick/ImageMagick/issues/618
libmagickwand-dev CVE-2017-13058 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100468
https://access.redhat.com/security/cve/CVE-2017-13058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
https://github.com/ImageMagick/ImageMagick/issues/666
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-13059 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100457
https://access.redhat.com/security/cve/CVE-2017-13059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
https://github.com/ImageMagick/ImageMagick/issues/667
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-13060 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100469
https://access.redhat.com/security/cve/CVE-2017-13060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
https://github.com/ImageMagick/ImageMagick/issues/644
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-13062 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
https://github.com/ImageMagick/ImageMagick/issues/669
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-13131 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100478
https://access.redhat.com/security/cve/CVE-2017-13131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
https://github.com/ImageMagick/ImageMagick/issues/676
https://security.gentoo.org/glsa/201711-07
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-13146 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-13146
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013
https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20
https://security.gentoo.org/glsa/201711-07
libmagickwand-dev CVE-2017-14137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14137
https://github.com/ImageMagick/ImageMagick/issues/641
https://security.gentoo.org/glsa/201711-07
libmagickwand-dev CVE-2017-14138 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14138
https://github.com/ImageMagick/ImageMagick/issues/639
https://security.gentoo.org/glsa/201711-07
libmagickwand-dev CVE-2017-14139 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14139
https://github.com/ImageMagick/ImageMagick/issues/578
https://security.gentoo.org/glsa/201711-07
libmagickwand-dev CVE-2017-14324 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100863
https://access.redhat.com/security/cve/CVE-2017-14324
https://github.com/ImageMagick/ImageMagick/issues/739
libmagickwand-dev CVE-2017-14325 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100874
https://access.redhat.com/security/cve/CVE-2017-14325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
https://github.com/ImageMagick/ImageMagick/issues/741
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-14326 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
https://github.com/ImageMagick/ImageMagick/issues/740
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-14342 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
https://github.com/ImageMagick/ImageMagick/issues/650
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-14343 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
https://github.com/ImageMagick/ImageMagick/issues/649
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-14531 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100888
https://access.redhat.com/security/cve/CVE-2017-14531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
https://github.com/ImageMagick/ImageMagick/issues/718
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-14533 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/100885
https://access.redhat.com/security/cve/CVE-2017-14533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
https://github.com/ImageMagick/ImageMagick/issues/648
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-14684 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-14684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
https://github.com/ImageMagick/ImageMagick/issues/770
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-15016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
https://github.com/ImageMagick/ImageMagick/issues/725
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-15032 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-15033 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-15033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-15217 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101231
https://access.redhat.com/security/cve/CVE-2017-15217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
https://github.com/ImageMagick/ImageMagick/issues/759
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-15218 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/101233
https://access.redhat.com/security/cve/CVE-2017-15218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
https://github.com/ImageMagick/ImageMagick/issues/760
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17680 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102203
https://access.redhat.com/security/cve/CVE-2017-17680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
https://github.com/ImageMagick/ImageMagick/issues/873
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17880 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102317
https://access.redhat.com/security/cve/CVE-2017-17880
https://github.com/ImageMagick/ImageMagick/issues/907
libmagickwand-dev CVE-2017-17881 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
https://github.com/ImageMagick/ImageMagick/issues/878
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17882 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
https://github.com/ImageMagick/ImageMagick/issues/880
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17883 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17883
https://github.com/ImageMagick/ImageMagick/issues/877
libmagickwand-dev CVE-2017-17884 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
https://github.com/ImageMagick/ImageMagick/issues/902
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17885 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
https://github.com/ImageMagick/ImageMagick/issues/879
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17886 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
https://github.com/ImageMagick/ImageMagick/issues/874
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17887 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-17887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
https://github.com/ImageMagick/ImageMagick/issues/903
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-17934 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102314
https://access.redhat.com/security/cve/CVE-2017-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
https://github.com/ImageMagick/ImageMagick/issues/920
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18008 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102346
https://access.redhat.com/security/cve/CVE-2017-18008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
https://github.com/ImageMagick/ImageMagick/issues/921
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18022 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102437
https://access.redhat.com/security/cve/CVE-2017-18022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
https://github.com/ImageMagick/ImageMagick/issues/904
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18027 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102527
https://access.redhat.com/security/cve/CVE-2017-18027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
https://github.com/ImageMagick/ImageMagick/issues/734
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18028 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
https://github.com/ImageMagick/ImageMagick/issues/736
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18029 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102519
https://access.redhat.com/security/cve/CVE-2017-18029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
https://github.com/ImageMagick/ImageMagick/issues/691
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18251 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
https://github.com/ImageMagick/ImageMagick/issues/809
https://linux.oracle.com/cve/CVE-2017-18251.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-18254 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2017-18254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
https://github.com/ImageMagick/ImageMagick/issues/808
https://linux.oracle.com/cve/CVE-2017-18254.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2017-6502 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/96763
https://access.redhat.com/security/cve/CVE-2017-6502
https://github.com/ImageMagick/ImageMagick/commit/126c7c98ea788241922c30df4a5633ea692cf8df
libmagickwand-dev CVE-2017-7275 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/97166
https://access.redhat.com/security/cve/CVE-2017-7275
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
libmagickwand-dev CVE-2018-10804 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
https://github.com/ImageMagick/ImageMagick/issues/1053
https://linux.oracle.com/cve/CVE-2018-10804.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-10805 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-10805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
https://github.com/ImageMagick/ImageMagick/issues/1054
https://linux.oracle.com/cve/CVE-2018-10805.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-11655 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
https://github.com/ImageMagick/ImageMagick/issues/930
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-11656 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-11656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
https://github.com/ImageMagick/ImageMagick/issues/931
https://linux.oracle.com/cve/CVE-2018-11656.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-13153 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/104687
http://www.securitytracker.com/id/1041219
https://access.redhat.com/security/cve/CVE-2018-13153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
https://github.com/ImageMagick/ImageMagick/issues/1195
https://linux.oracle.com/cve/CVE-2018-13153.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3711-1
https://usn.ubuntu.com/3711-1/
libmagickwand-dev CVE-2018-14434 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
https://github.com/ImageMagick/ImageMagick/issues/1192
https://linux.oracle.com/cve/CVE-2018-14434.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/3785-1/
https://usn.ubuntu.com/4034-1/
libmagickwand-dev CVE-2018-14435 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
https://github.com/ImageMagick/ImageMagick/issues/1193
https://linux.oracle.com/cve/CVE-2018-14435.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-dev CVE-2018-14436 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
https://github.com/ImageMagick/ImageMagick/issues/1191
https://linux.oracle.com/cve/CVE-2018-14436.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-dev CVE-2018-14437 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-14437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
https://github.com/ImageMagick/ImageMagick/issues/1190
https://linux.oracle.com/cve/CVE-2018-14437.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-dev CVE-2018-15607 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-dev CVE-2018-16640 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-16640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-dev CVE-2018-16750 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/108492
https://access.redhat.com/security/cve/CVE-2018-16750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
https://github.com/ImageMagick/ImageMagick/commit/33d1b9590c401d4aee666ffd10b16868a38cf705
https://github.com/ImageMagick/ImageMagick/issues/1118
https://github.com/ImageMagick/ImageMagick6/commit/359331c61193138ce2b85331df25235b81499cfc
https://linux.oracle.com/cve/CVE-2018-16750.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-3785-1
https://usn.ubuntu.com/3785-1/
libmagickwand-dev CVE-2018-17965 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17965
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
https://github.com/ImageMagick/ImageMagick/issues/1052
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-dev CVE-2018-17966 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17966
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
https://github.com/ImageMagick/ImageMagick/issues/1050
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-dev CVE-2018-17967 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-17967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-17967
https://github.com/ImageMagick/ImageMagick/issues/1051
libmagickwand-dev CVE-2018-18016 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-18016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-18016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
https://github.com/ImageMagick/ImageMagick/issues/1049
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-dev CVE-2018-18544 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
https://access.redhat.com/security/cve/CVE-2018-18544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
https://github.com/ImageMagick/ImageMagick/issues/1360
https://linux.oracle.com/cve/CVE-2018-18544.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
libmagickwand-dev CVE-2018-5246 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102469
https://access.redhat.com/security/cve/CVE-2018-5246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
https://github.com/ImageMagick/ImageMagick/issues/929
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-5247 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
https://github.com/ImageMagick/ImageMagick/issues/928
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-5357 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/102497
https://access.redhat.com/security/cve/CVE-2018-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
https://github.com/ImageMagick/ImageMagick/issues/941
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-5358 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-5358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
https://github.com/ImageMagick/ImageMagick/issues/939
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-6405 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-6405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
https://github.com/ImageMagick/ImageMagick/issues/964
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
libmagickwand-dev CVE-2018-7470 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-7470
https://github.com/ImageMagick/ImageMagick/issues/998
libmagickwand-dev CVE-2018-9135 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2018-9135
https://github.com/ImageMagick/ImageMagick/issues/1009
libmagickwand-dev CVE-2019-10649 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://www.securityfocus.com/bid/107645
https://access.redhat.com/security/cve/CVE-2019-10649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
https://github.com/ImageMagick/ImageMagick/issues/1533
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-12975 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
https://github.com/ImageMagick/ImageMagick/issues/1517
https://linux.oracle.com/cve/CVE-2019-12975.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-12976 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
http://www.securityfocus.com/bid/108913
https://access.redhat.com/security/cve/CVE-2019-12976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
https://github.com/ImageMagick/ImageMagick/issues/1520
https://linux.oracle.com/cve/CVE-2019-12976.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-13137 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick/issues/1601
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-13301 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1585
https://github.com/ImageMagick/ImageMagick/issues/1589
https://linux.oracle.com/cve/CVE-2019-13301.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-13309 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13309.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-13310 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://linux.oracle.com/cve/CVE-2019-13310.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-dev CVE-2019-13311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html
https://access.redhat.com/security/cve/CVE-2019-13311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://linux.oracle.com/cve/CVE-2019-13311.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-16708 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16708.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-16709 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
https://github.com/ImageMagick/ImageMagick/issues/1531
https://linux.oracle.com/cve/CVE-2019-16709.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
libmagickwand-dev CVE-2019-16710 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
https://github.com/ImageMagick/ImageMagick/issues/1528
https://linux.oracle.com/cve/CVE-2019-16710.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-16711 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
https://github.com/ImageMagick/ImageMagick/issues/1542
https://linux.oracle.com/cve/CVE-2019-16711.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-16712 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
https://github.com/ImageMagick/ImageMagick/issues/1557
https://linux.oracle.com/cve/CVE-2019-16712.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
libmagickwand-dev CVE-2019-16713 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
https://access.redhat.com/security/cve/CVE-2019-16713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
https://github.com/ImageMagick/ImageMagick/issues/1558
https://linux.oracle.com/cve/CVE-2019-16713.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4192-1
https://usn.ubuntu.com/4192-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-7175 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
https://access.redhat.com/security/cve/CVE-2019-7175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
https://linux.oracle.com/cve/CVE-2019-7175.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-7395 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106850
https://access.redhat.com/security/cve/CVE-2019-7395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-7396 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://www.securityfocus.com/bid/106849
https://access.redhat.com/security/cve/CVE-2019-7396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
https://github.com/ImageMagick/ImageMagick/issues/1452
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-7397 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106847
https://access.redhat.com/security/cve/CVE-2019-7397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
https://linux.oracle.com/cve/CVE-2019-7397.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2019-7398 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
http://www.securityfocus.com/bid/106848
https://access.redhat.com/security/cve/CVE-2019-7398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
https://github.com/ImageMagick/ImageMagick/issues/1453
https://linux.oracle.com/cve/CVE-2019-7398.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
https://www.debian.org/security/2020/dsa-4712
libmagickwand-dev CVE-2020-25666 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25666
https://bugzilla.redhat.com/show_bug.cgi?id=1891612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-25675 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-25675
https://bugzilla.redhat.com/show_bug.cgi?id=1891933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27751 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u13
Expand...https://access.redhat.com/security/cve/CVE-2020-27751
https://bugzilla.redhat.com/show_bug.cgi?id=1891994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27753 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27753
https://bugzilla.redhat.com/show_bug.cgi?id=1894229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://ubuntu.com/security/notices/USN-4988-1
https://ubuntu.com/security/notices/USN-5335-1
libmagickwand-dev CVE-2020-27754 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27754
https://bugzilla.redhat.com/show_bug.cgi?id=1894231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27755 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2020-27755
https://bugzilla.redhat.com/show_bug.cgi?id=1894232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27757 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27757
https://bugzilla.redhat.com/show_bug.cgi?id=1894234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27758 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27758
https://bugzilla.redhat.com/show_bug.cgi?id=1894236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27759 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27759
https://bugzilla.redhat.com/show_bug.cgi?id=1894238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27761 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27761
https://bugzilla.redhat.com/show_bug.cgi?id=1894679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27764 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://access.redhat.com/security/cve/CVE-2020-27764
https://bugzilla.redhat.com/show_bug.cgi?id=1894683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27767 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27767
https://bugzilla.redhat.com/show_bug.cgi?id=1894687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27768 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27768
https://bugzilla.redhat.com/show_bug.cgi?id=1894689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27769 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27769
https://bugzilla.redhat.com/show_bug.cgi?id=1894690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://github.com/ImageMagick/ImageMagick/issues/1740
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27771 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27771
https://bugzilla.redhat.com/show_bug.cgi?id=1898290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27772 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27772
https://bugzilla.redhat.com/show_bug.cgi?id=1898291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27774 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27774
https://bugzilla.redhat.com/show_bug.cgi?id=1898296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27775 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27775
https://bugzilla.redhat.com/show_bug.cgi?id=1898300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2020-27776 LOW 8:6.9.7.4+dfsg-11+deb9u11 8:6.9.7.4+dfsg-11+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-27776
https://bugzilla.redhat.com/show_bug.cgi?id=1898304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://ubuntu.com/security/notices/USN-4988-1
libmagickwand-dev CVE-2021-20311 LOW 8:6.9.7.4+dfsg-11+deb9u11
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
libmariadbclient-dev CVE-2021-27928 HIGH 10.1.48-0+deb9u1 10.1.48-0+deb9u2
Expand...http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html
https://access.redhat.com/security/cve/CVE-2021-27928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928
https://jira.mariadb.org/browse/MDEV-25179
https://linux.oracle.com/cve/CVE-2021-27928.html
https://linux.oracle.com/errata/ELSA-2021-1242.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html
https://mariadb.com/kb/en/mariadb-10237-release-notes/
https://mariadb.com/kb/en/mariadb-10328-release-notes/
https://mariadb.com/kb/en/mariadb-10418-release-notes/
https://mariadb.com/kb/en/mariadb-1059-release-notes/
https://mariadb.com/kb/en/security/
https://nvd.nist.gov/vuln/detail/CVE-2021-27928
https://security.gentoo.org/glsa/202105-28
libmariadbclient-dev CVE-2022-27376 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27376
https://jira.mariadb.org/browse/MDEV-26354
https://nvd.nist.gov/vuln/detail/CVE-2022-27376
https://security.netapp.com/advisory/ntap-20220519-0007/
libmariadbclient-dev CVE-2022-27377 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27377
https://jira.mariadb.org/browse/MDEV-26281
https://nvd.nist.gov/vuln/detail/CVE-2022-27377
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev CVE-2022-27378 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27378
https://jira.mariadb.org/browse/MDEV-26423
https://nvd.nist.gov/vuln/detail/CVE-2022-27378
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev CVE-2022-27379 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27379
https://jira.mariadb.org/browse/MDEV-26353
https://nvd.nist.gov/vuln/detail/CVE-2022-27379
https://security.netapp.com/advisory/ntap-20220526-0005/
libmariadbclient-dev CVE-2022-27380 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27380
https://jira.mariadb.org/browse/MDEV-26280
https://nvd.nist.gov/vuln/detail/CVE-2022-27380
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev CVE-2022-27381 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27381
https://jira.mariadb.org/browse/MDEV-26061
https://nvd.nist.gov/vuln/detail/CVE-2022-27381
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient-dev CVE-2022-27382 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27382
https://jira.mariadb.org/browse/MDEV-26402
https://nvd.nist.gov/vuln/detail/CVE-2022-27382
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev CVE-2022-27383 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27383
https://jira.mariadb.org/browse/MDEV-26323
https://nvd.nist.gov/vuln/detail/CVE-2022-27383
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient-dev CVE-2022-27384 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27384
https://jira.mariadb.org/browse/MDEV-26047
https://nvd.nist.gov/vuln/detail/CVE-2022-27384
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient-dev CVE-2022-27385 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27385
https://jira.mariadb.org/browse/MDEV-26415
https://nvd.nist.gov/vuln/detail/CVE-2022-27385
https://security.netapp.com/advisory/ntap-20220526-0008/
libmariadbclient-dev CVE-2022-27386 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27386
https://jira.mariadb.org/browse/MDEV-26406
https://nvd.nist.gov/vuln/detail/CVE-2022-27386
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev CVE-2022-27387 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27387
https://jira.mariadb.org/browse/MDEV-26422
https://nvd.nist.gov/vuln/detail/CVE-2022-27387
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev CVE-2022-27444 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27444
https://jira.mariadb.org/browse/MDEV-28080
https://nvd.nist.gov/vuln/detail/CVE-2022-27444
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27445 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27445
https://jira.mariadb.org/browse/MDEV-28081
https://nvd.nist.gov/vuln/detail/CVE-2022-27445
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27446 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27446
https://jira.mariadb.org/browse/MDEV-28082
https://nvd.nist.gov/vuln/detail/CVE-2022-27446
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27447 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27447
https://jira.mariadb.org/browse/MDEV-28099
https://nvd.nist.gov/vuln/detail/CVE-2022-27447
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27448 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27448
https://jira.mariadb.org/browse/MDEV-28095
https://nvd.nist.gov/vuln/detail/CVE-2022-27448
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27449 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27449
https://jira.mariadb.org/browse/MDEV-28089
https://nvd.nist.gov/vuln/detail/CVE-2022-27449
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27451 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27451
https://jira.mariadb.org/browse/MDEV-28094
https://nvd.nist.gov/vuln/detail/CVE-2022-27451
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27452 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27452
https://jira.mariadb.org/browse/MDEV-28090
https://nvd.nist.gov/vuln/detail/CVE-2022-27452
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev CVE-2022-27455 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27455
https://jira.mariadb.org/browse/MDEV-28097
https://nvd.nist.gov/vuln/detail/CVE-2022-27455
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev CVE-2022-27456 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27456
https://jira.mariadb.org/browse/MDEV-28093
https://nvd.nist.gov/vuln/detail/CVE-2022-27456
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev CVE-2022-27457 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27457
https://jira.mariadb.org/browse/MDEV-28098
https://nvd.nist.gov/vuln/detail/CVE-2022-27457
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev CVE-2022-27458 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27458
https://jira.mariadb.org/browse/MDEV-28099
https://nvd.nist.gov/vuln/detail/CVE-2022-27458
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev-compat CVE-2021-27928 HIGH 10.1.48-0+deb9u1 10.1.48-0+deb9u2
Expand...http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html
https://access.redhat.com/security/cve/CVE-2021-27928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928
https://jira.mariadb.org/browse/MDEV-25179
https://linux.oracle.com/cve/CVE-2021-27928.html
https://linux.oracle.com/errata/ELSA-2021-1242.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html
https://mariadb.com/kb/en/mariadb-10237-release-notes/
https://mariadb.com/kb/en/mariadb-10328-release-notes/
https://mariadb.com/kb/en/mariadb-10418-release-notes/
https://mariadb.com/kb/en/mariadb-1059-release-notes/
https://mariadb.com/kb/en/security/
https://nvd.nist.gov/vuln/detail/CVE-2021-27928
https://security.gentoo.org/glsa/202105-28
libmariadbclient-dev-compat CVE-2022-27376 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27376
https://jira.mariadb.org/browse/MDEV-26354
https://nvd.nist.gov/vuln/detail/CVE-2022-27376
https://security.netapp.com/advisory/ntap-20220519-0007/
libmariadbclient-dev-compat CVE-2022-27377 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27377
https://jira.mariadb.org/browse/MDEV-26281
https://nvd.nist.gov/vuln/detail/CVE-2022-27377
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev-compat CVE-2022-27378 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27378
https://jira.mariadb.org/browse/MDEV-26423
https://nvd.nist.gov/vuln/detail/CVE-2022-27378
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev-compat CVE-2022-27379 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27379
https://jira.mariadb.org/browse/MDEV-26353
https://nvd.nist.gov/vuln/detail/CVE-2022-27379
https://security.netapp.com/advisory/ntap-20220526-0005/
libmariadbclient-dev-compat CVE-2022-27380 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27380
https://jira.mariadb.org/browse/MDEV-26280
https://nvd.nist.gov/vuln/detail/CVE-2022-27380
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev-compat CVE-2022-27381 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27381
https://jira.mariadb.org/browse/MDEV-26061
https://nvd.nist.gov/vuln/detail/CVE-2022-27381
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient-dev-compat CVE-2022-27382 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27382
https://jira.mariadb.org/browse/MDEV-26402
https://nvd.nist.gov/vuln/detail/CVE-2022-27382
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev-compat CVE-2022-27383 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27383
https://jira.mariadb.org/browse/MDEV-26323
https://nvd.nist.gov/vuln/detail/CVE-2022-27383
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient-dev-compat CVE-2022-27384 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27384
https://jira.mariadb.org/browse/MDEV-26047
https://nvd.nist.gov/vuln/detail/CVE-2022-27384
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient-dev-compat CVE-2022-27385 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27385
https://jira.mariadb.org/browse/MDEV-26415
https://nvd.nist.gov/vuln/detail/CVE-2022-27385
https://security.netapp.com/advisory/ntap-20220526-0008/
libmariadbclient-dev-compat CVE-2022-27386 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27386
https://jira.mariadb.org/browse/MDEV-26406
https://nvd.nist.gov/vuln/detail/CVE-2022-27386
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev-compat CVE-2022-27387 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27387
https://jira.mariadb.org/browse/MDEV-26422
https://nvd.nist.gov/vuln/detail/CVE-2022-27387
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient-dev-compat CVE-2022-27444 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27444
https://jira.mariadb.org/browse/MDEV-28080
https://nvd.nist.gov/vuln/detail/CVE-2022-27444
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27445 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27445
https://jira.mariadb.org/browse/MDEV-28081
https://nvd.nist.gov/vuln/detail/CVE-2022-27445
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27446 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27446
https://jira.mariadb.org/browse/MDEV-28082
https://nvd.nist.gov/vuln/detail/CVE-2022-27446
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27447 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27447
https://jira.mariadb.org/browse/MDEV-28099
https://nvd.nist.gov/vuln/detail/CVE-2022-27447
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27448 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27448
https://jira.mariadb.org/browse/MDEV-28095
https://nvd.nist.gov/vuln/detail/CVE-2022-27448
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27449 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27449
https://jira.mariadb.org/browse/MDEV-28089
https://nvd.nist.gov/vuln/detail/CVE-2022-27449
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27451 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27451
https://jira.mariadb.org/browse/MDEV-28094
https://nvd.nist.gov/vuln/detail/CVE-2022-27451
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27452 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27452
https://jira.mariadb.org/browse/MDEV-28090
https://nvd.nist.gov/vuln/detail/CVE-2022-27452
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient-dev-compat CVE-2022-27455 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27455
https://jira.mariadb.org/browse/MDEV-28097
https://nvd.nist.gov/vuln/detail/CVE-2022-27455
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev-compat CVE-2022-27456 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27456
https://jira.mariadb.org/browse/MDEV-28093
https://nvd.nist.gov/vuln/detail/CVE-2022-27456
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev-compat CVE-2022-27457 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27457
https://jira.mariadb.org/browse/MDEV-28098
https://nvd.nist.gov/vuln/detail/CVE-2022-27457
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient-dev-compat CVE-2022-27458 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27458
https://jira.mariadb.org/browse/MDEV-28099
https://nvd.nist.gov/vuln/detail/CVE-2022-27458
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient18 CVE-2021-27928 HIGH 10.1.48-0+deb9u1 10.1.48-0+deb9u2
Expand...http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html
https://access.redhat.com/security/cve/CVE-2021-27928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928
https://jira.mariadb.org/browse/MDEV-25179
https://linux.oracle.com/cve/CVE-2021-27928.html
https://linux.oracle.com/errata/ELSA-2021-1242.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html
https://mariadb.com/kb/en/mariadb-10237-release-notes/
https://mariadb.com/kb/en/mariadb-10328-release-notes/
https://mariadb.com/kb/en/mariadb-10418-release-notes/
https://mariadb.com/kb/en/mariadb-1059-release-notes/
https://mariadb.com/kb/en/security/
https://nvd.nist.gov/vuln/detail/CVE-2021-27928
https://security.gentoo.org/glsa/202105-28
libmariadbclient18 CVE-2022-27376 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27376
https://jira.mariadb.org/browse/MDEV-26354
https://nvd.nist.gov/vuln/detail/CVE-2022-27376
https://security.netapp.com/advisory/ntap-20220519-0007/
libmariadbclient18 CVE-2022-27377 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27377
https://jira.mariadb.org/browse/MDEV-26281
https://nvd.nist.gov/vuln/detail/CVE-2022-27377
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient18 CVE-2022-27378 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27378
https://jira.mariadb.org/browse/MDEV-26423
https://nvd.nist.gov/vuln/detail/CVE-2022-27378
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient18 CVE-2022-27379 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27379
https://jira.mariadb.org/browse/MDEV-26353
https://nvd.nist.gov/vuln/detail/CVE-2022-27379
https://security.netapp.com/advisory/ntap-20220526-0005/
libmariadbclient18 CVE-2022-27380 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27380
https://jira.mariadb.org/browse/MDEV-26280
https://nvd.nist.gov/vuln/detail/CVE-2022-27380
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient18 CVE-2022-27381 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27381
https://jira.mariadb.org/browse/MDEV-26061
https://nvd.nist.gov/vuln/detail/CVE-2022-27381
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient18 CVE-2022-27382 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27382
https://jira.mariadb.org/browse/MDEV-26402
https://nvd.nist.gov/vuln/detail/CVE-2022-27382
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient18 CVE-2022-27383 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27383
https://jira.mariadb.org/browse/MDEV-26323
https://nvd.nist.gov/vuln/detail/CVE-2022-27383
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient18 CVE-2022-27384 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27384
https://jira.mariadb.org/browse/MDEV-26047
https://nvd.nist.gov/vuln/detail/CVE-2022-27384
https://security.netapp.com/advisory/ntap-20220519-0006/
libmariadbclient18 CVE-2022-27385 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27385
https://jira.mariadb.org/browse/MDEV-26415
https://nvd.nist.gov/vuln/detail/CVE-2022-27385
https://security.netapp.com/advisory/ntap-20220526-0008/
libmariadbclient18 CVE-2022-27386 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27386
https://jira.mariadb.org/browse/MDEV-26406
https://nvd.nist.gov/vuln/detail/CVE-2022-27386
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient18 CVE-2022-27387 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27387
https://jira.mariadb.org/browse/MDEV-26422
https://nvd.nist.gov/vuln/detail/CVE-2022-27387
https://security.netapp.com/advisory/ntap-20220526-0004/
libmariadbclient18 CVE-2022-27444 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27444
https://jira.mariadb.org/browse/MDEV-28080
https://nvd.nist.gov/vuln/detail/CVE-2022-27444
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27445 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27445
https://jira.mariadb.org/browse/MDEV-28081
https://nvd.nist.gov/vuln/detail/CVE-2022-27445
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27446 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27446
https://jira.mariadb.org/browse/MDEV-28082
https://nvd.nist.gov/vuln/detail/CVE-2022-27446
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27447 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27447
https://jira.mariadb.org/browse/MDEV-28099
https://nvd.nist.gov/vuln/detail/CVE-2022-27447
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27448 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27448
https://jira.mariadb.org/browse/MDEV-28095
https://nvd.nist.gov/vuln/detail/CVE-2022-27448
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27449 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27449
https://jira.mariadb.org/browse/MDEV-28089
https://nvd.nist.gov/vuln/detail/CVE-2022-27449
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27451 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27451
https://jira.mariadb.org/browse/MDEV-28094
https://nvd.nist.gov/vuln/detail/CVE-2022-27451
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27452 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27452
https://jira.mariadb.org/browse/MDEV-28090
https://nvd.nist.gov/vuln/detail/CVE-2022-27452
https://security.netapp.com/advisory/ntap-20220526-0006/
libmariadbclient18 CVE-2022-27455 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27455
https://jira.mariadb.org/browse/MDEV-28097
https://nvd.nist.gov/vuln/detail/CVE-2022-27455
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient18 CVE-2022-27456 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27456
https://jira.mariadb.org/browse/MDEV-28093
https://nvd.nist.gov/vuln/detail/CVE-2022-27456
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient18 CVE-2022-27457 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27457
https://jira.mariadb.org/browse/MDEV-28098
https://nvd.nist.gov/vuln/detail/CVE-2022-27457
https://security.netapp.com/advisory/ntap-20220526-0007/
libmariadbclient18 CVE-2022-27458 HIGH 10.1.48-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-27458
https://jira.mariadb.org/browse/MDEV-28099
https://nvd.nist.gov/vuln/detail/CVE-2022-27458
https://security.netapp.com/advisory/ntap-20220526-0007/
libmount1 CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
libmount1 CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libmount1 CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libmpx2 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libncurses5 CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncurses5 CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
libncurses5 CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncurses5 CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncurses5 CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libncurses5-dev CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncurses5-dev CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
libncurses5-dev CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncurses5-dev CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncurses5-dev CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libncursesw5 CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncursesw5 CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
libncursesw5 CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncursesw5 CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncursesw5 CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libncursesw5-dev CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libncursesw5-dev CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
libncursesw5-dev CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncursesw5-dev CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libncursesw5-dev CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libnettle6 CVE-2021-20305 HIGH 3.3-1 3.3-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-20305
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
https://linux.oracle.com/cve/CVE-2021-20305.html
https://linux.oracle.com/errata/ELSA-2021-1206.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
https://security.gentoo.org/glsa/202105-31
https://security.netapp.com/advisory/ntap-20211022-0002/
https://ubuntu.com/security/notices/USN-4906-1
https://www.debian.org/security/2021/dsa-4933
libnettle6 CVE-2021-3580 HIGH 3.3-1 3.3-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
libnettle6 CVE-2018-16869 MEDIUM 3.3-1
Expand...http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://ubuntu.com/security/notices/USN-4990-1
libnghttp2-14 CVE-2018-1000168 HIGH 1.18.1-1+deb9u1 1.18.1-1+deb9u2
Expand...http://www.securityfocus.com/bid/103952
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1000168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000168
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/
https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2018-1000168
libnghttp2-14 CVE-2020-11080 HIGH 1.18.1-1+deb9u1 1.18.1-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libopenexr-dev CVE-2021-20298 HIGH 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-20298
libopenexr-dev CVE-2021-20299 HIGH 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20299
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
https://bugzilla.redhat.com/show_bug.cgi?id=1939154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
https://github.com/AcademySoftwareFoundation/openexr/pull/840
libopenexr-dev CVE-2020-16587 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2020-16587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
https://github.com/AcademySoftwareFoundation/openexr/issues/491
https://ubuntu.com/security/notices/USN-4676-1
libopenexr-dev CVE-2021-20296 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-20296
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
libopenexr-dev CVE-2021-20300 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20300
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
https://bugzilla.redhat.com/show_bug.cgi?id=1939153
https://github.com/AcademySoftwareFoundation/openexr/pull/836
libopenexr-dev CVE-2021-20302 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20302
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
https://bugzilla.redhat.com/show_bug.cgi?id=1939161
https://github.com/AcademySoftwareFoundation/openexr/pull/842
libopenexr-dev CVE-2021-20303 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20303
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
https://bugzilla.redhat.com/show_bug.cgi?id=1939151
https://github.com/AcademySoftwareFoundation/openexr/pull/831
libopenexr-dev CVE-2021-23215 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-23215
https://bugzilla.redhat.com/show_bug.cgi?id=1947586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215
https://github.com/AcademySoftwareFoundation/openexr/pull/901
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr-dev CVE-2021-26260 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-26260
https://bugzilla.redhat.com/show_bug.cgi?id=1947582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260
https://github.com/AcademySoftwareFoundation/openexr/pull/894
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr-dev CVE-2021-3474 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3474
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
https://bugzilla.redhat.com/show_bug.cgi?id=1939142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
libopenexr-dev CVE-2021-3475 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3475
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
https://bugzilla.redhat.com/show_bug.cgi?id=1939144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr-dev CVE-2021-3476 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3476
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
https://bugzilla.redhat.com/show_bug.cgi?id=1939145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr-dev CVE-2021-3477 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3477
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
https://bugzilla.redhat.com/show_bug.cgi?id=1939159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr-dev CVE-2021-3478 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3478
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
https://bugzilla.redhat.com/show_bug.cgi?id=1939160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
libopenexr-dev CVE-2021-3479 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3479
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
https://bugzilla.redhat.com/show_bug.cgi?id=1939149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr-dev CVE-2021-3598 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3598
https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr-dev CVE-2021-3605 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3605
https://bugzilla.redhat.com/show_bug.cgi?id=1970991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605
https://github.com/AcademySoftwareFoundation/openexr/pull/1036
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr-dev CVE-2021-3941 MEDIUM 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-3941
https://bugzilla.redhat.com/show_bug.cgi?id=2019789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941
https://github.com/AcademySoftwareFoundation/openexr/pull/1153
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/
https://ubuntu.com/security/notices/USN-5150-1
libopenexr-dev CVE-2021-45942 MEDIUM 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-45942
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/
libopenexr-dev CVE-2017-14988 LOW 2.2.0-11+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html
https://access.redhat.com/security/cve/CVE-2017-14988
https://github.com/openexr/openexr/issues/248
libopenexr-dev CVE-2018-18443 LOW 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-18443
https://github.com/openexr/openexr/issues/350
https://github.com/openexr/openexr/releases/tag/v2.4.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/
libopenexr-dev CVE-2021-20304 LOW 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-20304
libopenexr-dev CVE-2021-26945 LOW 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-26945
https://bugzilla.redhat.com/show_bug.cgi?id=1947591
libopenexr22 CVE-2021-20298 HIGH 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-20298
libopenexr22 CVE-2021-20299 HIGH 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20299
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
https://bugzilla.redhat.com/show_bug.cgi?id=1939154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
https://github.com/AcademySoftwareFoundation/openexr/pull/840
libopenexr22 CVE-2020-16587 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2020-16587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
https://github.com/AcademySoftwareFoundation/openexr/issues/491
https://ubuntu.com/security/notices/USN-4676-1
libopenexr22 CVE-2021-20296 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-20296
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
libopenexr22 CVE-2021-20300 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20300
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
https://bugzilla.redhat.com/show_bug.cgi?id=1939153
https://github.com/AcademySoftwareFoundation/openexr/pull/836
libopenexr22 CVE-2021-20302 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20302
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
https://bugzilla.redhat.com/show_bug.cgi?id=1939161
https://github.com/AcademySoftwareFoundation/openexr/pull/842
libopenexr22 CVE-2021-20303 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-20303
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
https://bugzilla.redhat.com/show_bug.cgi?id=1939151
https://github.com/AcademySoftwareFoundation/openexr/pull/831
libopenexr22 CVE-2021-23215 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-23215
https://bugzilla.redhat.com/show_bug.cgi?id=1947586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215
https://github.com/AcademySoftwareFoundation/openexr/pull/901
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr22 CVE-2021-26260 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-26260
https://bugzilla.redhat.com/show_bug.cgi?id=1947582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260
https://github.com/AcademySoftwareFoundation/openexr/pull/894
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr22 CVE-2021-3474 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3474
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
https://bugzilla.redhat.com/show_bug.cgi?id=1939142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
libopenexr22 CVE-2021-3475 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3475
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
https://bugzilla.redhat.com/show_bug.cgi?id=1939144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr22 CVE-2021-3476 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3476
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
https://bugzilla.redhat.com/show_bug.cgi?id=1939145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr22 CVE-2021-3477 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3477
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
https://bugzilla.redhat.com/show_bug.cgi?id=1939159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr22 CVE-2021-3478 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3478
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
https://bugzilla.redhat.com/show_bug.cgi?id=1939160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
libopenexr22 CVE-2021-3479 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3479
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
https://bugzilla.redhat.com/show_bug.cgi?id=1939149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
libopenexr22 CVE-2021-3598 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3598
https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr22 CVE-2021-3605 MEDIUM 2.2.0-11+deb9u2 2.2.0-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3605
https://bugzilla.redhat.com/show_bug.cgi?id=1970991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605
https://github.com/AcademySoftwareFoundation/openexr/pull/1036
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
libopenexr22 CVE-2021-3941 MEDIUM 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-3941
https://bugzilla.redhat.com/show_bug.cgi?id=2019789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941
https://github.com/AcademySoftwareFoundation/openexr/pull/1153
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/
https://ubuntu.com/security/notices/USN-5150-1
libopenexr22 CVE-2021-45942 MEDIUM 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-45942
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/
libopenexr22 CVE-2017-14988 LOW 2.2.0-11+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html
https://access.redhat.com/security/cve/CVE-2017-14988
https://github.com/openexr/openexr/issues/248
libopenexr22 CVE-2018-18443 LOW 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-18443
https://github.com/openexr/openexr/issues/350
https://github.com/openexr/openexr/releases/tag/v2.4.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/
libopenexr22 CVE-2021-20304 LOW 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-20304
libopenexr22 CVE-2021-26945 LOW 2.2.0-11+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-26945
https://bugzilla.redhat.com/show_bug.cgi?id=1947591
libopenjp2-7 CVE-2021-3575 HIGH 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://ubuntu.com/security/CVE-2021-3575
libopenjp2-7 CVE-2020-27842 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2020-27842
https://bugzilla.redhat.com/show_bug.cgi?id=1907513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
https://linux.oracle.com/cve/CVE-2020-27842.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
https://security.gentoo.org/glsa/202101-29
https://ubuntu.com/security/notices/USN-4685-1
https://ubuntu.com/security/notices/USN-4686-1
https://www.debian.org/security/2021/dsa-4882
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
libopenjp2-7 CVE-2020-27843 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2020-27843
https://bugzilla.redhat.com/show_bug.cgi?id=1907516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
https://linux.oracle.com/cve/CVE-2020-27843.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
https://security.gentoo.org/glsa/202101-29
https://ubuntu.com/security/notices/USN-4685-1
https://ubuntu.com/security/notices/USN-4686-1
https://www.debian.org/security/2021/dsa-4882
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
libopenjp2-7 CVE-2021-29338 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2021-29338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
libopenjp2-7 CVE-2022-1122 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2022-1122
https://github.com/uclouvain/openjpeg/issues/1368
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIWSQFQWXDU4MT3XTVAO6HC7TVL3NHS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMKBAMK2CAM5TMC5TODKVCE5AAPTD5YV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/
libopenjp2-7 CVE-2016-10505 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2016-10505
https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-10506 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/100573
https://access.redhat.com/security/cve/CVE-2016-10506
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9113 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93980
https://access.redhat.com/security/cve/CVE-2016-9113
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9114 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93979
https://access.redhat.com/security/cve/CVE-2016-9114
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9115 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93977
https://access.redhat.com/security/cve/CVE-2016-9115
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9116 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93975
https://access.redhat.com/security/cve/CVE-2016-9116
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9117 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93783
https://access.redhat.com/security/cve/CVE-2016-9117
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9580 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/94822
https://access.redhat.com/security/cve/CVE-2016-9580
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2016-9581 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/94822
https://access.redhat.com/security/cve/CVE-2016-9581
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2017-12982 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2017-12982
https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982
https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7
https://github.com/uclouvain/openjpeg/issues/983
https://security.gentoo.org/glsa/201710-26
libopenjp2-7 CVE-2017-17479 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2017-17479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
libopenjp2-7 CVE-2018-16375 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/105266
https://access.redhat.com/security/cve/CVE-2018-16375
https://github.com/uclouvain/openjpeg/issues/1126
libopenjp2-7 CVE-2018-16376 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/105262
https://access.redhat.com/security/cve/CVE-2018-16376
https://github.com/uclouvain/openjpeg/issues/1127
libopenjp2-7 CVE-2018-20845 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/108921
https://access.redhat.com/security/cve/CVE-2018-20845
https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://linux.oracle.com/cve/CVE-2018-20845.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
libopenjp2-7 CVE-2018-20846 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/108921
https://access.redhat.com/security/cve/CVE-2018-20846
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
libopenjp2-7 CVE-2018-5727 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2018-5727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
https://github.com/uclouvain/openjpeg/issues/1053
https://linux.oracle.com/cve/CVE-2018-5727.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/notices/USN-4686-1
libopenjp2-7 CVE-2018-7648 LOW 2.1.2-1.1+deb9u6
Expand...https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d
https://github.com/uclouvain/openjpeg/issues/1088
libopenjp2-7 CVE-2019-6988 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/106785
https://access.redhat.com/security/cve/CVE-2019-6988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
libopenjp2-7-dev CVE-2021-3575 HIGH 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://ubuntu.com/security/CVE-2021-3575
libopenjp2-7-dev CVE-2020-27842 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2020-27842
https://bugzilla.redhat.com/show_bug.cgi?id=1907513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842
https://linux.oracle.com/cve/CVE-2020-27842.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
https://security.gentoo.org/glsa/202101-29
https://ubuntu.com/security/notices/USN-4685-1
https://ubuntu.com/security/notices/USN-4686-1
https://www.debian.org/security/2021/dsa-4882
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
libopenjp2-7-dev CVE-2020-27843 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2020-27843
https://bugzilla.redhat.com/show_bug.cgi?id=1907516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843
https://linux.oracle.com/cve/CVE-2020-27843.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
https://security.gentoo.org/glsa/202101-29
https://ubuntu.com/security/notices/USN-4685-1
https://ubuntu.com/security/notices/USN-4686-1
https://www.debian.org/security/2021/dsa-4882
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
libopenjp2-7-dev CVE-2021-29338 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2021-29338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
libopenjp2-7-dev CVE-2022-1122 MEDIUM 2.1.2-1.1+deb9u6 2.1.2-1.1+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2022-1122
https://github.com/uclouvain/openjpeg/issues/1368
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIWSQFQWXDU4MT3XTVAO6HC7TVL3NHS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMKBAMK2CAM5TMC5TODKVCE5AAPTD5YV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/
libopenjp2-7-dev CVE-2016-10505 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2016-10505
https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-10506 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/100573
https://access.redhat.com/security/cve/CVE-2016-10506
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9113 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93980
https://access.redhat.com/security/cve/CVE-2016-9113
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9114 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93979
https://access.redhat.com/security/cve/CVE-2016-9114
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9115 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93977
https://access.redhat.com/security/cve/CVE-2016-9115
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9116 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93975
https://access.redhat.com/security/cve/CVE-2016-9116
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9117 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/93783
https://access.redhat.com/security/cve/CVE-2016-9117
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9580 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/94822
https://access.redhat.com/security/cve/CVE-2016-9580
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2016-9581 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/94822
https://access.redhat.com/security/cve/CVE-2016-9581
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2017-12982 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2017-12982
https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982
https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7
https://github.com/uclouvain/openjpeg/issues/983
https://security.gentoo.org/glsa/201710-26
libopenjp2-7-dev CVE-2017-17479 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2017-17479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
libopenjp2-7-dev CVE-2018-16375 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/105266
https://access.redhat.com/security/cve/CVE-2018-16375
https://github.com/uclouvain/openjpeg/issues/1126
libopenjp2-7-dev CVE-2018-16376 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/105262
https://access.redhat.com/security/cve/CVE-2018-16376
https://github.com/uclouvain/openjpeg/issues/1127
libopenjp2-7-dev CVE-2018-20845 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/108921
https://access.redhat.com/security/cve/CVE-2018-20845
https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://linux.oracle.com/cve/CVE-2018-20845.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
libopenjp2-7-dev CVE-2018-20846 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/108921
https://access.redhat.com/security/cve/CVE-2018-20846
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
libopenjp2-7-dev CVE-2018-5727 LOW 2.1.2-1.1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2018-5727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
https://github.com/uclouvain/openjpeg/issues/1053
https://linux.oracle.com/cve/CVE-2018-5727.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/notices/USN-4686-1
libopenjp2-7-dev CVE-2018-7648 LOW 2.1.2-1.1+deb9u6
Expand...https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d
https://github.com/uclouvain/openjpeg/issues/1088
libopenjp2-7-dev CVE-2019-6988 LOW 2.1.2-1.1+deb9u6
Expand...http://www.securityfocus.com/bid/106785
https://access.redhat.com/security/cve/CVE-2019-6988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
libpathplan4 CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libpathplan4 CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libpathplan4 CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libpathplan4 CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libpcre16-3 CVE-2020-14155 MEDIUM 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcre16-3 CVE-2017-11164 LOW 2:8.39-3
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcre16-3 CVE-2017-16231 LOW 2:8.39-3
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcre16-3 CVE-2017-7245 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre16-3 CVE-2017-7246 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre16-3 CVE-2019-20838 LOW 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libpcre3 CVE-2020-14155 MEDIUM 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcre3 CVE-2017-11164 LOW 2:8.39-3
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcre3 CVE-2017-16231 LOW 2:8.39-3
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcre3 CVE-2017-7245 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3 CVE-2017-7246 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3 CVE-2019-20838 LOW 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libpcre3-dev CVE-2020-14155 MEDIUM 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcre3-dev CVE-2017-11164 LOW 2:8.39-3
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcre3-dev CVE-2017-16231 LOW 2:8.39-3
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcre3-dev CVE-2017-7245 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3-dev CVE-2017-7246 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre3-dev CVE-2019-20838 LOW 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libpcre32-3 CVE-2020-14155 MEDIUM 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcre32-3 CVE-2017-11164 LOW 2:8.39-3
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcre32-3 CVE-2017-16231 LOW 2:8.39-3
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcre32-3 CVE-2017-7245 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre32-3 CVE-2017-7246 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcre32-3 CVE-2019-20838 LOW 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libpcrecpp0v5 CVE-2020-14155 MEDIUM 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libpcrecpp0v5 CVE-2017-11164 LOW 2:8.39-3
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libpcrecpp0v5 CVE-2017-16231 LOW 2:8.39-3
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
libpcrecpp0v5 CVE-2017-7245 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcrecpp0v5 CVE-2017-7246 LOW 2:8.39-3
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
libpcrecpp0v5 CVE-2019-20838 LOW 2:8.39-3
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libperl5.24 CVE-2020-16156 HIGH 5.24.1-3+deb9u7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
libperl5.24 CVE-2011-4116 LOW 5.24.1-3+deb9u7
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
libpng-dev CVE-2017-12652 CRITICAL 1.6.28-1+deb9u1
Expand...http://www.securityfocus.com/bid/109269
https://access.redhat.com/security/cve/CVE-2017-12652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652
https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE
https://linux.oracle.com/cve/CVE-2017-12652.html
https://linux.oracle.com/errata/ELSA-2020-3901.html
https://security.netapp.com/advisory/ntap-20220506-0003/
https://support.f5.com/csp/article/K88124225
https://support.f5.com/csp/article/K88124225?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-5432-1
libpng-dev CVE-2018-14048 LOW 1.6.28-1+deb9u1
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/security/cve/CVE-2018-14048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
https://ubuntu.com/security/notices/USN-5432-1
libpng-dev CVE-2018-14550 LOW 1.6.28-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-14550
https://github.com/advisories/GHSA-qwwr-qc2p-6283
https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
https://github.com/glennrp/libpng/issues/246
https://nvd.nist.gov/vuln/detail/CVE-2018-14550
https://security.gentoo.org/glsa/201908-02
https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpng-dev CVE-2019-6129 LOW 1.6.28-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6129
https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libpng-dev CVE-2021-4214 LOW 1.6.28-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-4214
libpng16-16 CVE-2017-12652 CRITICAL 1.6.28-1+deb9u1
Expand...http://www.securityfocus.com/bid/109269
https://access.redhat.com/security/cve/CVE-2017-12652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652
https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE
https://linux.oracle.com/cve/CVE-2017-12652.html
https://linux.oracle.com/errata/ELSA-2020-3901.html
https://security.netapp.com/advisory/ntap-20220506-0003/
https://support.f5.com/csp/article/K88124225
https://support.f5.com/csp/article/K88124225?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-5432-1
libpng16-16 CVE-2018-14048 LOW 1.6.28-1+deb9u1
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/security/cve/CVE-2018-14048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
https://ubuntu.com/security/notices/USN-5432-1
libpng16-16 CVE-2018-14550 LOW 1.6.28-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-14550
https://github.com/advisories/GHSA-qwwr-qc2p-6283
https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
https://github.com/glennrp/libpng/issues/246
https://nvd.nist.gov/vuln/detail/CVE-2018-14550
https://security.gentoo.org/glsa/201908-02
https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpng16-16 CVE-2019-6129 LOW 1.6.28-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2019-6129
https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libpng16-16 CVE-2021-4214 LOW 1.6.28-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-4214
libpq-dev CVE-2021-23214 HIGH 9.6.20-0+deb9u1 9.6.24-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-23214
https://bugzilla.redhat.com/show_bug.cgi?id=2022666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://errata.almalinux.org/8/ALSA-2022-1830.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951
https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951
https://linux.oracle.com/cve/CVE-2021-23214.html
https://linux.oracle.com/errata/ELSA-2022-1830.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23214/
libpq-dev CVE-2021-32027 HIGH 9.6.20-0+deb9u1 9.6.22-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-32027
https://bugzilla.redhat.com/show_bug.cgi?id=1956876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
https://linux.oracle.com/cve/CVE-2021-32027.html
https://linux.oracle.com/errata/ELSA-2021-9428.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32027
https://security.netapp.com/advisory/ntap-20210713-0004/
https://ubuntu.com/security/notices/USN-4972-1
https://www.postgresql.org/support/security/CVE-2021-32027/
libpq-dev CVE-2022-1552 HIGH 9.6.20-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-1552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=677a494789062ca88e0142a17bedd5415f6ab0aa (REL_14_3)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=ab49ce7c3414ac19e4afb386d7843ce2d2fb8bda (REL_14_3)
https://ubuntu.com/security/notices/USN-5440-1
https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
https://www.postgresql.org/support/security/CVE-2022-1552/
libpq-dev CVE-2021-23222 MEDIUM 9.6.20-0+deb9u1 9.6.24-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-23222
https://bugzilla.redhat.com/show_bug.cgi?id=2022675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://errata.almalinux.org/8/ALSA-2022-1891.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228
https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45
https://linux.oracle.com/cve/CVE-2021-23222.html
https://linux.oracle.com/errata/ELSA-2022-1891.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23222/
libpq-dev CVE-2021-32028 MEDIUM 9.6.20-0+deb9u1 9.6.22-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-32028
https://bugzilla.redhat.com/show_bug.cgi?id=1956877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=4a8656a7ee0c155b0249376af58eb3fc3a90415f (REL_13_3)
https://linux.oracle.com/cve/CVE-2021-32028.html
https://linux.oracle.com/errata/ELSA-2021-9428.html
https://security.netapp.com/advisory/ntap-20211112-0003/
https://ubuntu.com/security/notices/USN-4972-1
https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
https://www.postgresql.org/support/security/CVE-2021-32028
https://www.postgresql.org/support/security/CVE-2021-32028/
libpq-dev CVE-2019-9193 LOW 9.6.20-0+deb9u1
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html
http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html
https://access.redhat.com/security/cve/CVE-2019-9193
https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/
https://security.netapp.com/advisory/ntap-20190502-0003/
https://www.postgresql.org/about/news/1935/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
libpq-dev DLA-2751-1 UNKNOWN 9.6.20-0+deb9u1 9.6.23-0+deb9u1
Expand...
libpq5 CVE-2021-23214 HIGH 9.6.20-0+deb9u1 9.6.24-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-23214
https://bugzilla.redhat.com/show_bug.cgi?id=2022666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://errata.almalinux.org/8/ALSA-2022-1830.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951
https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951
https://linux.oracle.com/cve/CVE-2021-23214.html
https://linux.oracle.com/errata/ELSA-2022-1830.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23214/
libpq5 CVE-2021-32027 HIGH 9.6.20-0+deb9u1 9.6.22-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-32027
https://bugzilla.redhat.com/show_bug.cgi?id=1956876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
https://linux.oracle.com/cve/CVE-2021-32027.html
https://linux.oracle.com/errata/ELSA-2021-9428.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32027
https://security.netapp.com/advisory/ntap-20210713-0004/
https://ubuntu.com/security/notices/USN-4972-1
https://www.postgresql.org/support/security/CVE-2021-32027/
libpq5 CVE-2022-1552 HIGH 9.6.20-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-1552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=677a494789062ca88e0142a17bedd5415f6ab0aa (REL_14_3)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=ab49ce7c3414ac19e4afb386d7843ce2d2fb8bda (REL_14_3)
https://ubuntu.com/security/notices/USN-5440-1
https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
https://www.postgresql.org/support/security/CVE-2022-1552/
libpq5 CVE-2021-23222 MEDIUM 9.6.20-0+deb9u1 9.6.24-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-23222
https://bugzilla.redhat.com/show_bug.cgi?id=2022675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://errata.almalinux.org/8/ALSA-2022-1891.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228
https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45
https://linux.oracle.com/cve/CVE-2021-23222.html
https://linux.oracle.com/errata/ELSA-2022-1891.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23222/
libpq5 CVE-2021-32028 MEDIUM 9.6.20-0+deb9u1 9.6.22-0+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-32028
https://bugzilla.redhat.com/show_bug.cgi?id=1956877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=4a8656a7ee0c155b0249376af58eb3fc3a90415f (REL_13_3)
https://linux.oracle.com/cve/CVE-2021-32028.html
https://linux.oracle.com/errata/ELSA-2021-9428.html
https://security.netapp.com/advisory/ntap-20211112-0003/
https://ubuntu.com/security/notices/USN-4972-1
https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
https://www.postgresql.org/support/security/CVE-2021-32028
https://www.postgresql.org/support/security/CVE-2021-32028/
libpq5 CVE-2019-9193 LOW 9.6.20-0+deb9u1
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html
http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html
https://access.redhat.com/security/cve/CVE-2019-9193
https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/
https://security.netapp.com/advisory/ntap-20190502-0003/
https://www.postgresql.org/about/news/1935/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
libpq5 DLA-2751-1 UNKNOWN 9.6.20-0+deb9u1 9.6.23-0+deb9u1
Expand...
libpython-stdlib CVE-2008-4108 LOW 2.7.13-2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://access.redhat.com/security/cve/CVE-2008-4108
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
libpython2.7-minimal CVE-2015-20107 CRITICAL 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
libpython2.7-minimal CVE-2021-3177 CRITICAL 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython2.7-minimal CVE-2019-16935 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
libpython2.7-minimal CVE-2021-23336 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython2.7-minimal CVE-2021-4189 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
libpython2.7-minimal CVE-2013-7040 LOW 2.7.13-2+deb9u4
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
libpython2.7-minimal CVE-2017-17522 LOW 2.7.13-2+deb9u4
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
libpython2.7-minimal CVE-2018-1000030 LOW 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
libpython2.7-minimal CVE-2019-18348 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
libpython2.7-minimal CVE-2019-9674 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
libpython2.7-minimal CVE-2020-8492 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
libpython2.7-stdlib CVE-2015-20107 CRITICAL 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
libpython2.7-stdlib CVE-2021-3177 CRITICAL 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython2.7-stdlib CVE-2019-16935 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
libpython2.7-stdlib CVE-2021-23336 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython2.7-stdlib CVE-2021-4189 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
libpython2.7-stdlib CVE-2013-7040 LOW 2.7.13-2+deb9u4
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
libpython2.7-stdlib CVE-2017-17522 LOW 2.7.13-2+deb9u4
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
libpython2.7-stdlib CVE-2018-1000030 LOW 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
libpython2.7-stdlib CVE-2019-18348 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
libpython2.7-stdlib CVE-2019-9674 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
libpython2.7-stdlib CVE-2020-8492 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
libpython3.5-minimal CVE-2015-20107 CRITICAL 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
libpython3.5-minimal CVE-2021-3177 CRITICAL 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.5-minimal CVE-2021-3737 HIGH 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
libpython3.5-minimal CVE-2022-0391 HIGH 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libpython3.5-minimal CVE-2021-23336 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.5-minimal CVE-2021-3426 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.5-minimal CVE-2021-3733 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
libpython3.5-minimal CVE-2021-4189 MEDIUM 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
libpython3.5-minimal CVE-2017-17522 LOW 3.5.3-1+deb9u3
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
libpython3.5-minimal CVE-2019-9674 LOW 3.5.3-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
libpython3.5-stdlib CVE-2015-20107 CRITICAL 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
libpython3.5-stdlib CVE-2021-3177 CRITICAL 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.5-stdlib CVE-2021-3737 HIGH 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
libpython3.5-stdlib CVE-2022-0391 HIGH 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libpython3.5-stdlib CVE-2021-23336 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.5-stdlib CVE-2021-3426 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.5-stdlib CVE-2021-3733 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
libpython3.5-stdlib CVE-2021-4189 MEDIUM 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
libpython3.5-stdlib CVE-2017-17522 LOW 3.5.3-1+deb9u3
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
libpython3.5-stdlib CVE-2019-9674 LOW 3.5.3-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
libquadmath0 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libsasl2-2 CVE-2022-24407 HIGH 2.1.27~101-g0780600+dfsg-3+deb9u1 2.1.27~101-g0780600+dfsg-3+deb9u2
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
libsasl2-modules-db CVE-2022-24407 HIGH 2.1.27~101-g0780600+dfsg-3+deb9u1 2.1.27~101-g0780600+dfsg-3+deb9u2
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
libsepol1 CVE-2021-36084 LOW 2.6-2
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36085 LOW 2.6-2
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36086 LOW 2.6-2
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36087 LOW 2.6-2
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
libsmartcols1 CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
libsmartcols1 CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libsmartcols1 CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libsqlite3-0 CVE-2019-8457 CRITICAL 3.16.2-5+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libsqlite3-0 CVE-2021-45346 MEDIUM 3.16.2-5+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
libsqlite3-0 CVE-2017-13685 LOW 3.16.2-5+deb9u3
Expand...http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
http://www.securityfocus.com/bid/100521
https://access.redhat.com/security/cve/CVE-2017-13685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
libsqlite3-0 CVE-2020-11656 LOW 3.16.2-5+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
libsqlite3-dev CVE-2019-8457 CRITICAL 3.16.2-5+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libsqlite3-dev CVE-2021-45346 MEDIUM 3.16.2-5+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
libsqlite3-dev CVE-2017-13685 LOW 3.16.2-5+deb9u3
Expand...http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
http://www.securityfocus.com/bid/100521
https://access.redhat.com/security/cve/CVE-2017-13685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
libsqlite3-dev CVE-2020-11656 LOW 3.16.2-5+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
libss2 CVE-2022-1304 HIGH 1.43.4-2+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libssh2-1 CVE-2019-13115 HIGH 1.7.0-1+deb9u1 1.7.0-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
libssh2-1 CVE-2019-17498 HIGH 1.7.0-1+deb9u1 1.7.0-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
libssl-dev CVE-2022-1292 CRITICAL 1.1.0l-1~deb9u2 1.1.0l-1~deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
libssl-dev CVE-2021-23840 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
libssl-dev CVE-2021-3712 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
libssl-dev CVE-2022-0778 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u5
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
libssl-dev CVE-2019-1551 MEDIUM 1.1.0l-1~deb9u2 1.1.0l-1~deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
libssl-dev CVE-2021-23841 MEDIUM 1.1.0l-1~deb9u2 1.1.0l-1~deb9u3
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
libssl-dev CVE-2021-4160 MEDIUM 1.1.0l-1~deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
libssl-dev CVE-2007-6755 LOW 1.1.0l-1~deb9u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
libssl-dev CVE-2010-0928 LOW 1.1.0l-1~deb9u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
libssl1.0.2 CVE-2021-23840 HIGH 1.0.2u-1~deb9u3 1.0.2u-1~deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
libssl1.0.2 CVE-2021-3712 HIGH 1.0.2u-1~deb9u3 1.0.2u-1~deb9u6
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
libssl1.0.2 CVE-2022-0778 HIGH 1.0.2u-1~deb9u3 1.0.2u-1~deb9u7
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
libssl1.0.2 CVE-2021-23841 MEDIUM 1.0.2u-1~deb9u3 1.0.2u-1~deb9u4
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
libssl1.0.2 CVE-2021-3601 LOW 1.0.2u-1~deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-3601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
libssl1.0.2 DLA-2761-1 UNKNOWN 1.0.2u-1~deb9u3 1.0.2u-1~deb9u5
Expand...
libssl1.1 CVE-2022-1292 CRITICAL 1.1.0l-1~deb9u2 1.1.0l-1~deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
libssl1.1 CVE-2021-23840 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
libssl1.1 CVE-2021-3712 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
libssl1.1 CVE-2022-0778 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u5
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
libssl1.1 CVE-2019-1551 MEDIUM 1.1.0l-1~deb9u2 1.1.0l-1~deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
libssl1.1 CVE-2021-23841 MEDIUM 1.1.0l-1~deb9u2 1.1.0l-1~deb9u3
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
libssl1.1 CVE-2021-4160 MEDIUM 1.1.0l-1~deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
libssl1.1 CVE-2007-6755 LOW 1.1.0l-1~deb9u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
libssl1.1 CVE-2010-0928 LOW 1.1.0l-1~deb9u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
libstdc++-6-dev CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libstdc++6 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libsvn1 CVE-2020-17525 HIGH 1.9.5-1+deb9u5 1.9.5-1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-17525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525
https://errata.almalinux.org/8/ALSA-2021-0507.html
https://linux.oracle.com/cve/CVE-2020-17525.html
https://linux.oracle.com/errata/ELSA-2021-0507.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17525
https://subversion.apache.org/security/CVE-2020-17525-advisory.txt
https://ubuntu.com/security/notices/USN-5322-1
https://ubuntu.com/security/notices/USN-5445-1
libsvn1 CVE-2021-28544 MEDIUM 1.9.5-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-28544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28544
https://nvd.nist.gov/vuln/detail/CVE-2021-28544
https://subversion.apache.org/security/CVE-2021-28544-advisory.txt
https://ubuntu.com/security/notices/USN-5372-1
https://www.debian.org/security/2022/dsa-5119
libsystemd0 CVE-2019-3843 HIGH 232-25+deb9u12
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2019-3844 HIGH 232-25+deb9u12
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2020-1712 HIGH 232-25+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-1712
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712
https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
https://linux.oracle.com/cve/CVE-2020-1712.html
https://linux.oracle.com/errata/ELSA-2020-0575.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1712
https://ubuntu.com/security/notices/USN-4269-1
https://www.openwall.com/lists/oss-security/2020/02/05/1
libsystemd0 CVE-2021-33910 MEDIUM 232-25+deb9u12 232-25+deb9u13
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
libsystemd0 CVE-2021-3997 MEDIUM 232-25+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libsystemd0 CVE-2013-4392 LOW 232-25+deb9u12
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
libsystemd0 CVE-2017-1000082 LOW 232-25+deb9u12
Expand...http://www.openwall.com/lists/oss-security/2017/07/02/1
http://www.securityfocus.com/bid/99507
http://www.securitytracker.com/id/1038839
https://access.redhat.com/security/cve/CVE-2017-1000082
https://github.com/systemd/systemd/issues/6237
libsystemd0 CVE-2017-18078 LOW 232-25+deb9u12
Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
libsystemd0 CVE-2018-16888 LOW 232-25+deb9u12
Expand...https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/security/cve/CVE-2018-16888
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888
https://linux.oracle.com/cve/CVE-2018-16888.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E
https://security.netapp.com/advisory/ntap-20190307-0007/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2018-6954 LOW 232-25+deb9u12
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
libsystemd0 CVE-2019-20386 LOW 232-25+deb9u12
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libsystemd0 CVE-2020-13529 LOW 232-25+deb9u12
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
libsystemd0 CVE-2020-13776 LOW 232-25+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
libtasn1-6 CVE-2018-1000654 LOW 4.10-1.1+deb9u1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
libtiff5 CVE-2020-19131 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u7
Expand...http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/
http://bugzilla.maptools.org/show_bug.cgi?id=2831
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19131.json
https://access.redhat.com/security/cve/CVE-2020-19131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131
https://errata.almalinux.org/8/ALSA-2022-1810.html
https://linux.oracle.com/cve/CVE-2020-19131.html
https://linux.oracle.com/errata/ELSA-2022-1810.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
libtiff5 CVE-2020-35523 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-35523
https://bugzilla.redhat.com/show_bug.cgi?id=1932040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523
https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
https://gitlab.com/libtiff/libtiff/-/merge_requests/160
https://linux.oracle.com/cve/CVE-2020-35523.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35523
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-4755-1
https://www.debian.org/security/2021/dsa-4869
libtiff5 CVE-2020-35524 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-35524
https://bugzilla.redhat.com/show_bug.cgi?id=1932044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524
https://gitlab.com/libtiff/libtiff/-/merge_requests/159
https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22
https://linux.oracle.com/cve/CVE-2020-35524.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35524
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-4755-1
https://www.debian.org/security/2021/dsa-4869
libtiff5 CVE-2022-0891 HIGH 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0891
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2020-19144 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u7
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2852
https://access.redhat.com/security/cve/CVE-2020-19144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144
https://gitlab.com/libtiff/libtiff/-/issues/159
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
https://security.netapp.com/advisory/ntap-20211004-0005/
libtiff5 CVE-2022-0561 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0561
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-0562 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-0562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0562
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-0865 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0865
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-0907 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0907
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0907
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-0908 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0908
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0908
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-0909 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0909
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0909
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-0924 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0924
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0924
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2022-1210 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1210
https://gitlab.com/libtiff/libtiff/-/issues/402
https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
https://nvd.nist.gov/vuln/detail/CVE-2022-1210
https://security.netapp.com/advisory/ntap-20220513-0005/
https://vuldb.com/?id.196363
libtiff5 CVE-2022-1354 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
libtiff5 CVE-2022-1355 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1355
libtiff5 CVE-2022-1622 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1622
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1622
libtiff5 CVE-2022-1623 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1623
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1623
libtiff5 CVE-2022-22844 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5 CVE-2014-8130 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://access.redhat.com/security/cve/CVE-2014-8130
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
libtiff5 CVE-2017-16232 LOW 4.0.8-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
https://access.redhat.com/security/cve/CVE-2017-16232
libtiff5 CVE-2017-17973 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://access.redhat.com/security/cve/CVE-2017-17973
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
libtiff5 CVE-2017-5563 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://access.redhat.com/security/cve/CVE-2017-5563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
libtiff5 CVE-2017-9117 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://access.redhat.com/security/cve/CVE-2017-9117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
libtiff5 CVE-2018-10126 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libtiff5 CVE-2018-18661 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2819
http://www.securityfocus.com/bid/105762
https://access.redhat.com/errata/RHSA-2019:2053
https://access.redhat.com/security/cve/CVE-2018-18661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661
https://linux.oracle.com/cve/CVE-2018-18661.html
https://linux.oracle.com/errata/ELSA-2019-2053.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
https://ubuntu.com/security/notices/USN-3864-1
https://usn.ubuntu.com/3864-1/
libtiff5 CVE-2019-6128 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2836
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html
http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
https://access.redhat.com/security/cve/CVE-2019-6128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128
https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
https://seclists.org/bugtraq/2019/Nov/5
https://security.gentoo.org/glsa/202003-25
https://ubuntu.com/security/notices/USN-3906-1
https://ubuntu.com/security/notices/USN-3906-2
https://usn.ubuntu.com/3906-1/
https://usn.ubuntu.com/3906-2/
libtiff5 CVE-2020-35521 LOW 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-35521
https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35521
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
libtiff5 CVE-2020-35522 LOW 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-35522
https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35522
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-5421-1
libtiff5 CVE-2022-1056 LOW 4.0.8-2+deb9u5
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
https://gitlab.com/libtiff/libtiff/-/issues/391
https://gitlab.com/libtiff/libtiff/-/merge_requests/307
https://nvd.nist.gov/vuln/detail/CVE-2022-1056
libtiff5-dev CVE-2020-19131 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u7
Expand...http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/
http://bugzilla.maptools.org/show_bug.cgi?id=2831
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19131.json
https://access.redhat.com/security/cve/CVE-2020-19131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131
https://errata.almalinux.org/8/ALSA-2022-1810.html
https://linux.oracle.com/cve/CVE-2020-19131.html
https://linux.oracle.com/errata/ELSA-2022-1810.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
libtiff5-dev CVE-2020-35523 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-35523
https://bugzilla.redhat.com/show_bug.cgi?id=1932040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523
https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
https://gitlab.com/libtiff/libtiff/-/merge_requests/160
https://linux.oracle.com/cve/CVE-2020-35523.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35523
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-4755-1
https://www.debian.org/security/2021/dsa-4869
libtiff5-dev CVE-2020-35524 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-35524
https://bugzilla.redhat.com/show_bug.cgi?id=1932044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524
https://gitlab.com/libtiff/libtiff/-/merge_requests/159
https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22
https://linux.oracle.com/cve/CVE-2020-35524.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35524
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-4755-1
https://www.debian.org/security/2021/dsa-4869
libtiff5-dev CVE-2022-0891 HIGH 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0891
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2020-19144 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u7
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2852
https://access.redhat.com/security/cve/CVE-2020-19144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144
https://gitlab.com/libtiff/libtiff/-/issues/159
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
https://security.netapp.com/advisory/ntap-20211004-0005/
libtiff5-dev CVE-2022-0561 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0561
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-0562 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-0562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0562
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-0865 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0865
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-0907 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0907
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0907
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-0908 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0908
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0908
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-0909 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0909
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0909
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-0924 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0924
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0924
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2022-1210 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1210
https://gitlab.com/libtiff/libtiff/-/issues/402
https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
https://nvd.nist.gov/vuln/detail/CVE-2022-1210
https://security.netapp.com/advisory/ntap-20220513-0005/
https://vuldb.com/?id.196363
libtiff5-dev CVE-2022-1354 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
libtiff5-dev CVE-2022-1355 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1355
libtiff5-dev CVE-2022-1622 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1622
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1622
libtiff5-dev CVE-2022-1623 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1623
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1623
libtiff5-dev CVE-2022-22844 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
libtiff5-dev CVE-2014-8130 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://access.redhat.com/security/cve/CVE-2014-8130
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
libtiff5-dev CVE-2017-16232 LOW 4.0.8-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
https://access.redhat.com/security/cve/CVE-2017-16232
libtiff5-dev CVE-2017-17973 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://access.redhat.com/security/cve/CVE-2017-17973
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
libtiff5-dev CVE-2017-5563 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://access.redhat.com/security/cve/CVE-2017-5563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
libtiff5-dev CVE-2017-9117 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://access.redhat.com/security/cve/CVE-2017-9117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
libtiff5-dev CVE-2018-10126 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libtiff5-dev CVE-2018-18661 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2819
http://www.securityfocus.com/bid/105762
https://access.redhat.com/errata/RHSA-2019:2053
https://access.redhat.com/security/cve/CVE-2018-18661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661
https://linux.oracle.com/cve/CVE-2018-18661.html
https://linux.oracle.com/errata/ELSA-2019-2053.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
https://ubuntu.com/security/notices/USN-3864-1
https://usn.ubuntu.com/3864-1/
libtiff5-dev CVE-2019-6128 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2836
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html
http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
https://access.redhat.com/security/cve/CVE-2019-6128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128
https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
https://seclists.org/bugtraq/2019/Nov/5
https://security.gentoo.org/glsa/202003-25
https://ubuntu.com/security/notices/USN-3906-1
https://ubuntu.com/security/notices/USN-3906-2
https://usn.ubuntu.com/3906-1/
https://usn.ubuntu.com/3906-2/
libtiff5-dev CVE-2020-35521 LOW 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-35521
https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35521
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
libtiff5-dev CVE-2020-35522 LOW 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-35522
https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35522
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-5421-1
libtiff5-dev CVE-2022-1056 LOW 4.0.8-2+deb9u5
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
https://gitlab.com/libtiff/libtiff/-/issues/391
https://gitlab.com/libtiff/libtiff/-/merge_requests/307
https://nvd.nist.gov/vuln/detail/CVE-2022-1056
libtiffxx5 CVE-2020-19131 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u7
Expand...http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/
http://bugzilla.maptools.org/show_bug.cgi?id=2831
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19131.json
https://access.redhat.com/security/cve/CVE-2020-19131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131
https://errata.almalinux.org/8/ALSA-2022-1810.html
https://linux.oracle.com/cve/CVE-2020-19131.html
https://linux.oracle.com/errata/ELSA-2022-1810.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
libtiffxx5 CVE-2020-35523 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-35523
https://bugzilla.redhat.com/show_bug.cgi?id=1932040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523
https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
https://gitlab.com/libtiff/libtiff/-/merge_requests/160
https://linux.oracle.com/cve/CVE-2020-35523.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35523
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-4755-1
https://www.debian.org/security/2021/dsa-4869
libtiffxx5 CVE-2020-35524 HIGH 4.0.8-2+deb9u5 4.0.8-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-35524
https://bugzilla.redhat.com/show_bug.cgi?id=1932044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524
https://gitlab.com/libtiff/libtiff/-/merge_requests/159
https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22
https://linux.oracle.com/cve/CVE-2020-35524.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35524
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-4755-1
https://www.debian.org/security/2021/dsa-4869
libtiffxx5 CVE-2022-0891 HIGH 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0891
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2020-19144 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u7
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2852
https://access.redhat.com/security/cve/CVE-2020-19144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144
https://gitlab.com/libtiff/libtiff/-/issues/159
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
https://security.netapp.com/advisory/ntap-20211004-0005/
libtiffxx5 CVE-2022-0561 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0561
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-0562 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-0562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0562
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-0865 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0865
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-0907 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0907
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0907
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-0908 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0908
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0908
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-0909 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0909
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0909
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-0924 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-0924
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0924
https://security.netapp.com/advisory/ntap-20220506-0002/
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2022-1210 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1210
https://gitlab.com/libtiff/libtiff/-/issues/402
https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
https://nvd.nist.gov/vuln/detail/CVE-2022-1210
https://security.netapp.com/advisory/ntap-20220513-0005/
https://vuldb.com/?id.196363
libtiffxx5 CVE-2022-1354 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
libtiffxx5 CVE-2022-1355 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1355
libtiffxx5 CVE-2022-1622 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1622
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1622
libtiffxx5 CVE-2022-1623 MEDIUM 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2022-1623
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1623
libtiffxx5 CVE-2022-22844 MEDIUM 4.0.8-2+deb9u5 4.0.8-2+deb9u8
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
libtiffxx5 CVE-2014-8130 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://access.redhat.com/security/cve/CVE-2014-8130
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
libtiffxx5 CVE-2017-16232 LOW 4.0.8-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
https://access.redhat.com/security/cve/CVE-2017-16232
libtiffxx5 CVE-2017-17973 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://access.redhat.com/security/cve/CVE-2017-17973
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
libtiffxx5 CVE-2017-5563 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://access.redhat.com/security/cve/CVE-2017-5563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
libtiffxx5 CVE-2017-9117 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://access.redhat.com/security/cve/CVE-2017-9117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
libtiffxx5 CVE-2018-10126 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
libtiffxx5 CVE-2018-18661 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2819
http://www.securityfocus.com/bid/105762
https://access.redhat.com/errata/RHSA-2019:2053
https://access.redhat.com/security/cve/CVE-2018-18661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661
https://linux.oracle.com/cve/CVE-2018-18661.html
https://linux.oracle.com/errata/ELSA-2019-2053.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
https://ubuntu.com/security/notices/USN-3864-1
https://usn.ubuntu.com/3864-1/
libtiffxx5 CVE-2019-6128 LOW 4.0.8-2+deb9u5
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2836
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html
http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
https://access.redhat.com/security/cve/CVE-2019-6128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128
https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
https://seclists.org/bugtraq/2019/Nov/5
https://security.gentoo.org/glsa/202003-25
https://ubuntu.com/security/notices/USN-3906-1
https://ubuntu.com/security/notices/USN-3906-2
https://usn.ubuntu.com/3906-1/
https://usn.ubuntu.com/3906-2/
libtiffxx5 CVE-2020-35521 LOW 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-35521
https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35521
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
libtiffxx5 CVE-2020-35522 LOW 4.0.8-2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2020-35522
https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35522
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-5421-1
libtiffxx5 CVE-2022-1056 LOW 4.0.8-2+deb9u5
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
https://gitlab.com/libtiff/libtiff/-/issues/391
https://gitlab.com/libtiff/libtiff/-/merge_requests/307
https://nvd.nist.gov/vuln/detail/CVE-2022-1056
libtinfo-dev CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libtinfo-dev CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
libtinfo-dev CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libtinfo-dev CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libtinfo-dev CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libtinfo5 CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
libtinfo5 CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
libtinfo5 CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libtinfo5 CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
libtinfo5 CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
libtsan0 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libubsan0 CVE-2018-12886 HIGH 6.3.0-18+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
libudev1 CVE-2019-3843 HIGH 232-25+deb9u12
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2019-3844 HIGH 232-25+deb9u12
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2020-1712 HIGH 232-25+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-1712
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712
https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
https://linux.oracle.com/cve/CVE-2020-1712.html
https://linux.oracle.com/errata/ELSA-2020-0575.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1712
https://ubuntu.com/security/notices/USN-4269-1
https://www.openwall.com/lists/oss-security/2020/02/05/1
libudev1 CVE-2021-33910 MEDIUM 232-25+deb9u12 232-25+deb9u13
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
libudev1 CVE-2021-3997 MEDIUM 232-25+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libudev1 CVE-2013-4392 LOW 232-25+deb9u12
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
libudev1 CVE-2017-1000082 LOW 232-25+deb9u12
Expand...http://www.openwall.com/lists/oss-security/2017/07/02/1
http://www.securityfocus.com/bid/99507
http://www.securitytracker.com/id/1038839
https://access.redhat.com/security/cve/CVE-2017-1000082
https://github.com/systemd/systemd/issues/6237
libudev1 CVE-2017-18078 LOW 232-25+deb9u12
Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
libudev1 CVE-2018-16888 LOW 232-25+deb9u12
Expand...https://access.redhat.com/errata/RHSA-2019:2091
https://access.redhat.com/security/cve/CVE-2018-16888
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888
https://linux.oracle.com/cve/CVE-2018-16888.html
https://linux.oracle.com/errata/ELSA-2019-2091.html
https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E
https://security.netapp.com/advisory/ntap-20190307-0007/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2018-6954 LOW 232-25+deb9u12
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
libudev1 CVE-2019-20386 LOW 232-25+deb9u12
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
libudev1 CVE-2020-13529 LOW 232-25+deb9u12
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
libudev1 CVE-2020-13776 LOW 232-25+deb9u12
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
libuuid1 CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
libuuid1 CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libuuid1 CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libwebp-dev CVE-2018-25009 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25009
https://bugzilla.redhat.com/show_bug.cgi?id=1956917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009
https://linux.oracle.com/cve/CVE-2018-25009.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25009
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2018-25010 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25010
https://bugzilla.redhat.com/show_bug.cgi?id=1956918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010
https://linux.oracle.com/cve/CVE-2018-25010.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25010
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2018-25011 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25011
https://bugzilla.redhat.com/show_bug.cgi?id=1956919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011
https://linux.oracle.com/cve/CVE-2018-25011.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25011
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2018-25012 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25012
https://bugzilla.redhat.com/show_bug.cgi?id=1956922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012
https://linux.oracle.com/cve/CVE-2018-25012.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25012
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
libwebp-dev CVE-2018-25013 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25013
https://bugzilla.redhat.com/show_bug.cgi?id=1956926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013
https://linux.oracle.com/cve/CVE-2018-25013.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25013
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2018-25014 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25014
https://bugzilla.redhat.com/show_bug.cgi?id=1956927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014
https://linux.oracle.com/cve/CVE-2018-25014.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25014
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2020-36328 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36328
https://bugzilla.redhat.com/show_bug.cgi?id=1956829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328
https://linux.oracle.com/cve/CVE-2020-36328.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36328
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2020-36329 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36329
https://bugzilla.redhat.com/show_bug.cgi?id=1956843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329
https://linux.oracle.com/cve/CVE-2020-36329.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36329
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2020-36330 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36330
https://bugzilla.redhat.com/show_bug.cgi?id=1956853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330
https://linux.oracle.com/cve/CVE-2020-36330.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36330
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2020-36331 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36331
https://bugzilla.redhat.com/show_bug.cgi?id=1956856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331
https://linux.oracle.com/cve/CVE-2020-36331.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36331
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2020-36332 HIGH 0.5.2-1
Expand...https://access.redhat.com/security/cve/CVE-2020-36332
https://bugzilla.redhat.com/show_bug.cgi?id=1956868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332
https://linux.oracle.com/cve/CVE-2020-36332.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36332
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://www.debian.org/security/2021/dsa-4930
libwebp-dev CVE-2016-9085 LOW 0.5.2-1
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
libwebp6 CVE-2018-25009 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25009
https://bugzilla.redhat.com/show_bug.cgi?id=1956917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009
https://linux.oracle.com/cve/CVE-2018-25009.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25009
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2018-25010 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25010
https://bugzilla.redhat.com/show_bug.cgi?id=1956918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010
https://linux.oracle.com/cve/CVE-2018-25010.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25010
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2018-25011 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25011
https://bugzilla.redhat.com/show_bug.cgi?id=1956919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011
https://linux.oracle.com/cve/CVE-2018-25011.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25011
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2018-25012 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25012
https://bugzilla.redhat.com/show_bug.cgi?id=1956922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012
https://linux.oracle.com/cve/CVE-2018-25012.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25012
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
libwebp6 CVE-2018-25013 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25013
https://bugzilla.redhat.com/show_bug.cgi?id=1956926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013
https://linux.oracle.com/cve/CVE-2018-25013.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25013
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2018-25014 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25014
https://bugzilla.redhat.com/show_bug.cgi?id=1956927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014
https://linux.oracle.com/cve/CVE-2018-25014.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25014
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2020-36328 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36328
https://bugzilla.redhat.com/show_bug.cgi?id=1956829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328
https://linux.oracle.com/cve/CVE-2020-36328.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36328
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2020-36329 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36329
https://bugzilla.redhat.com/show_bug.cgi?id=1956843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329
https://linux.oracle.com/cve/CVE-2020-36329.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36329
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2020-36330 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36330
https://bugzilla.redhat.com/show_bug.cgi?id=1956853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330
https://linux.oracle.com/cve/CVE-2020-36330.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36330
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2020-36331 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36331
https://bugzilla.redhat.com/show_bug.cgi?id=1956856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331
https://linux.oracle.com/cve/CVE-2020-36331.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36331
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2020-36332 HIGH 0.5.2-1
Expand...https://access.redhat.com/security/cve/CVE-2020-36332
https://bugzilla.redhat.com/show_bug.cgi?id=1956868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332
https://linux.oracle.com/cve/CVE-2020-36332.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36332
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://www.debian.org/security/2021/dsa-4930
libwebp6 CVE-2016-9085 LOW 0.5.2-1
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
libwebpdemux2 CVE-2018-25009 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25009
https://bugzilla.redhat.com/show_bug.cgi?id=1956917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009
https://linux.oracle.com/cve/CVE-2018-25009.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25009
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2018-25010 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25010
https://bugzilla.redhat.com/show_bug.cgi?id=1956918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010
https://linux.oracle.com/cve/CVE-2018-25010.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25010
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2018-25011 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25011
https://bugzilla.redhat.com/show_bug.cgi?id=1956919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011
https://linux.oracle.com/cve/CVE-2018-25011.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25011
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2018-25012 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25012
https://bugzilla.redhat.com/show_bug.cgi?id=1956922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012
https://linux.oracle.com/cve/CVE-2018-25012.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25012
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
libwebpdemux2 CVE-2018-25013 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25013
https://bugzilla.redhat.com/show_bug.cgi?id=1956926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013
https://linux.oracle.com/cve/CVE-2018-25013.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25013
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2018-25014 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25014
https://bugzilla.redhat.com/show_bug.cgi?id=1956927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014
https://linux.oracle.com/cve/CVE-2018-25014.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25014
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2020-36328 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36328
https://bugzilla.redhat.com/show_bug.cgi?id=1956829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328
https://linux.oracle.com/cve/CVE-2020-36328.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36328
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2020-36329 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36329
https://bugzilla.redhat.com/show_bug.cgi?id=1956843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329
https://linux.oracle.com/cve/CVE-2020-36329.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36329
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2020-36330 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36330
https://bugzilla.redhat.com/show_bug.cgi?id=1956853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330
https://linux.oracle.com/cve/CVE-2020-36330.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36330
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2020-36331 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36331
https://bugzilla.redhat.com/show_bug.cgi?id=1956856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331
https://linux.oracle.com/cve/CVE-2020-36331.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36331
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2020-36332 HIGH 0.5.2-1
Expand...https://access.redhat.com/security/cve/CVE-2020-36332
https://bugzilla.redhat.com/show_bug.cgi?id=1956868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332
https://linux.oracle.com/cve/CVE-2020-36332.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36332
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://www.debian.org/security/2021/dsa-4930
libwebpdemux2 CVE-2016-9085 LOW 0.5.2-1
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
libwebpmux2 CVE-2018-25009 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25009
https://bugzilla.redhat.com/show_bug.cgi?id=1956917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009
https://linux.oracle.com/cve/CVE-2018-25009.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25009
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2018-25010 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25010
https://bugzilla.redhat.com/show_bug.cgi?id=1956918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010
https://linux.oracle.com/cve/CVE-2018-25010.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25010
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2018-25011 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25011
https://bugzilla.redhat.com/show_bug.cgi?id=1956919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011
https://linux.oracle.com/cve/CVE-2018-25011.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25011
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2018-25012 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25012
https://bugzilla.redhat.com/show_bug.cgi?id=1956922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012
https://linux.oracle.com/cve/CVE-2018-25012.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25012
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
libwebpmux2 CVE-2018-25013 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-25013
https://bugzilla.redhat.com/show_bug.cgi?id=1956926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013
https://linux.oracle.com/cve/CVE-2018-25013.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25013
https://security.netapp.com/advisory/ntap-20211112-0001/
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2018-25014 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2018-25014
https://bugzilla.redhat.com/show_bug.cgi?id=1956927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014
https://linux.oracle.com/cve/CVE-2018-25014.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25014
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2020-36328 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36328
https://bugzilla.redhat.com/show_bug.cgi?id=1956829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328
https://linux.oracle.com/cve/CVE-2020-36328.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36328
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2020-36329 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36329
https://bugzilla.redhat.com/show_bug.cgi?id=1956843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329
https://linux.oracle.com/cve/CVE-2020-36329.html
https://linux.oracle.com/errata/ELSA-2021-2354.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36329
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2020-36330 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36330
https://bugzilla.redhat.com/show_bug.cgi?id=1956853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330
https://linux.oracle.com/cve/CVE-2020-36330.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36330
https://security.netapp.com/advisory/ntap-20211104-0004/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2020-36331 CRITICAL 0.5.2-1 0.5.2-1+deb9u1
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
https://access.redhat.com/security/cve/CVE-2020-36331
https://bugzilla.redhat.com/show_bug.cgi?id=1956856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331
https://linux.oracle.com/cve/CVE-2020-36331.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36331
https://security.netapp.com/advisory/ntap-20211112-0001/
https://support.apple.com/kb/HT212601
https://ubuntu.com/security/notices/USN-4971-1
https://ubuntu.com/security/notices/USN-4971-2
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2020-36332 HIGH 0.5.2-1
Expand...https://access.redhat.com/security/cve/CVE-2020-36332
https://bugzilla.redhat.com/show_bug.cgi?id=1956868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332
https://linux.oracle.com/cve/CVE-2020-36332.html
https://linux.oracle.com/errata/ELSA-2021-4231.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36332
https://security.netapp.com/advisory/ntap-20211104-0004/
https://ubuntu.com/security/notices/USN-4971-1
https://www.debian.org/security/2021/dsa-4930
libwebpmux2 CVE-2016-9085 LOW 0.5.2-1
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
libwmf-dev CVE-2007-3476 LOW 0.2.8.4-10.6
Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
http://bugs.libgd.org/?do=details&task_id=87
http://fedoranews.org/updates/FEDORA-2007-205.shtml
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
http://osvdb.org/37741
http://secunia.com/advisories/25860
http://secunia.com/advisories/26272
http://secunia.com/advisories/26390
http://secunia.com/advisories/26415
http://secunia.com/advisories/26467
http://secunia.com/advisories/26663
http://secunia.com/advisories/26766
http://secunia.com/advisories/26856
http://secunia.com/advisories/29157
http://secunia.com/advisories/30168
http://secunia.com/advisories/31168
http://secunia.com/advisories/42813
http://security.gentoo.org/glsa/glsa-200708-05.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.debian.org/security/2008/dsa-1613
http://www.libgd.org/ReleaseNote020035
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
http://www.redhat.com/support/errata/RHSA-2008-0146.html
http://www.securityfocus.com/archive/1/478796/100/0/threaded
http://www.securityfocus.com/bid/24651
http://www.trustix.org/errata/2007/0024/
http://www.vupen.com/english/advisories/2011/0022
https://access.redhat.com/security/cve/CVE-2007-3476
https://bugzilla.redhat.com/show_bug.cgi?id=277421
https://issues.rpath.com/browse/RPL-1643
https://linux.oracle.com/cve/CVE-2007-3476.html
https://linux.oracle.com/errata/ELSA-2008-0146.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
libwmf-dev CVE-2007-3477 LOW 0.2.8.4-10.6
Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
http://bugs.libgd.org/?do=details&task_id=74
http://bugs.libgd.org/?do=details&task_id=92
http://fedoranews.org/updates/FEDORA-2007-205.shtml
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
http://osvdb.org/42062
http://secunia.com/advisories/25860
http://secunia.com/advisories/26272
http://secunia.com/advisories/26390
http://secunia.com/advisories/26415
http://secunia.com/advisories/26467
http://secunia.com/advisories/26663
http://secunia.com/advisories/26766
http://secunia.com/advisories/26856
http://secunia.com/advisories/30168
http://secunia.com/advisories/31168
http://secunia.com/advisories/42813
http://security.gentoo.org/glsa/glsa-200708-05.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.debian.org/security/2008/dsa-1613
http://www.libgd.org/ReleaseNote020035
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
http://www.securityfocus.com/archive/1/478796/100/0/threaded
http://www.securityfocus.com/bid/24651
http://www.trustix.org/errata/2007/0024/
http://www.vupen.com/english/advisories/2011/0022
https://access.redhat.com/security/cve/CVE-2007-3477
https://bugzilla.redhat.com/show_bug.cgi?id=277421
https://issues.rpath.com/browse/RPL-1643
libwmf-dev CVE-2007-3996 LOW 0.2.8.4-10.6
Expand...http://bugs.gentoo.org/show_bug.cgi?id=201546
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26930
http://secunia.com/advisories/26967
http://secunia.com/advisories/27102
http://secunia.com/advisories/27351
http://secunia.com/advisories/27377
http://secunia.com/advisories/27545
http://secunia.com/advisories/28009
http://secunia.com/advisories/28147
http://secunia.com/advisories/28658
http://secunia.com/advisories/31168
http://security.gentoo.org/glsa/glsa-200712-13.xml
http://securityreason.com/securityalert/3103
http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
http://www.debian.org/security/2008/dsa-1613
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/5_2_4.php
http://www.redhat.com/support/errata/RHSA-2007-0888.html
http://www.redhat.com/support/errata/RHSA-2007-0890.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-557-1
http://www.vupen.com/english/advisories/2007/3023
https://access.redhat.com/security/cve/CVE-2007-3996
https://exchange.xforce.ibmcloud.com/vulnerabilities/36382
https://exchange.xforce.ibmcloud.com/vulnerabilities/36383
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://linux.oracle.com/cve/CVE-2007-3996.html
https://linux.oracle.com/errata/ELSA-2007-0890.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
libwmf-dev CVE-2009-3546 LOW 0.2.8.4-10.6
Expand...http://marc.info/?l=oss-security&m=125562113503923&w=2
http://secunia.com/advisories/37069
http://secunia.com/advisories/37080
http://secunia.com/advisories/38055
http://svn.php.net/viewvc?view=revision&revision=289557
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
http://www.openwall.com/lists/oss-security/2009/11/20/5
http://www.redhat.com/support/errata/RHSA-2010-0003.html
http://www.securityfocus.com/bid/36712
http://www.vupen.com/english/advisories/2009/2929
http://www.vupen.com/english/advisories/2009/2930
https://access.redhat.com/security/cve/CVE-2009-3546
https://linux.oracle.com/cve/CVE-2009-3546.html
https://linux.oracle.com/errata/ELSA-2010-0040.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
libwmf0.2-7 CVE-2007-3476 LOW 0.2.8.4-10.6
Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
http://bugs.libgd.org/?do=details&task_id=87
http://fedoranews.org/updates/FEDORA-2007-205.shtml
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
http://osvdb.org/37741
http://secunia.com/advisories/25860
http://secunia.com/advisories/26272
http://secunia.com/advisories/26390
http://secunia.com/advisories/26415
http://secunia.com/advisories/26467
http://secunia.com/advisories/26663
http://secunia.com/advisories/26766
http://secunia.com/advisories/26856
http://secunia.com/advisories/29157
http://secunia.com/advisories/30168
http://secunia.com/advisories/31168
http://secunia.com/advisories/42813
http://security.gentoo.org/glsa/glsa-200708-05.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.debian.org/security/2008/dsa-1613
http://www.libgd.org/ReleaseNote020035
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
http://www.redhat.com/support/errata/RHSA-2008-0146.html
http://www.securityfocus.com/archive/1/478796/100/0/threaded
http://www.securityfocus.com/bid/24651
http://www.trustix.org/errata/2007/0024/
http://www.vupen.com/english/advisories/2011/0022
https://access.redhat.com/security/cve/CVE-2007-3476
https://bugzilla.redhat.com/show_bug.cgi?id=277421
https://issues.rpath.com/browse/RPL-1643
https://linux.oracle.com/cve/CVE-2007-3476.html
https://linux.oracle.com/errata/ELSA-2008-0146.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
libwmf0.2-7 CVE-2007-3477 LOW 0.2.8.4-10.6
Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
http://bugs.libgd.org/?do=details&task_id=74
http://bugs.libgd.org/?do=details&task_id=92
http://fedoranews.org/updates/FEDORA-2007-205.shtml
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
http://osvdb.org/42062
http://secunia.com/advisories/25860
http://secunia.com/advisories/26272
http://secunia.com/advisories/26390
http://secunia.com/advisories/26415
http://secunia.com/advisories/26467
http://secunia.com/advisories/26663
http://secunia.com/advisories/26766
http://secunia.com/advisories/26856
http://secunia.com/advisories/30168
http://secunia.com/advisories/31168
http://secunia.com/advisories/42813
http://security.gentoo.org/glsa/glsa-200708-05.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.debian.org/security/2008/dsa-1613
http://www.libgd.org/ReleaseNote020035
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
http://www.securityfocus.com/archive/1/478796/100/0/threaded
http://www.securityfocus.com/bid/24651
http://www.trustix.org/errata/2007/0024/
http://www.vupen.com/english/advisories/2011/0022
https://access.redhat.com/security/cve/CVE-2007-3477
https://bugzilla.redhat.com/show_bug.cgi?id=277421
https://issues.rpath.com/browse/RPL-1643
libwmf0.2-7 CVE-2007-3996 LOW 0.2.8.4-10.6
Expand...http://bugs.gentoo.org/show_bug.cgi?id=201546
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26930
http://secunia.com/advisories/26967
http://secunia.com/advisories/27102
http://secunia.com/advisories/27351
http://secunia.com/advisories/27377
http://secunia.com/advisories/27545
http://secunia.com/advisories/28009
http://secunia.com/advisories/28147
http://secunia.com/advisories/28658
http://secunia.com/advisories/31168
http://security.gentoo.org/glsa/glsa-200712-13.xml
http://securityreason.com/securityalert/3103
http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
http://www.debian.org/security/2008/dsa-1613
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/5_2_4.php
http://www.redhat.com/support/errata/RHSA-2007-0888.html
http://www.redhat.com/support/errata/RHSA-2007-0890.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-557-1
http://www.vupen.com/english/advisories/2007/3023
https://access.redhat.com/security/cve/CVE-2007-3996
https://exchange.xforce.ibmcloud.com/vulnerabilities/36382
https://exchange.xforce.ibmcloud.com/vulnerabilities/36383
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://linux.oracle.com/cve/CVE-2007-3996.html
https://linux.oracle.com/errata/ELSA-2007-0890.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
libwmf0.2-7 CVE-2009-3546 LOW 0.2.8.4-10.6
Expand...http://marc.info/?l=oss-security&m=125562113503923&w=2
http://secunia.com/advisories/37069
http://secunia.com/advisories/37080
http://secunia.com/advisories/38055
http://svn.php.net/viewvc?view=revision&revision=289557
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
http://www.openwall.com/lists/oss-security/2009/11/20/5
http://www.redhat.com/support/errata/RHSA-2010-0003.html
http://www.securityfocus.com/bid/36712
http://www.vupen.com/english/advisories/2009/2929
http://www.vupen.com/english/advisories/2009/2930
https://access.redhat.com/security/cve/CVE-2009-3546
https://linux.oracle.com/cve/CVE-2009-3546.html
https://linux.oracle.com/errata/ELSA-2010-0040.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
libx11-6 CVE-2021-31535 CRITICAL 2:1.6.4-3+deb9u3 2:1.6.4-3+deb9u4
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
libx11-data CVE-2021-31535 CRITICAL 2:1.6.4-3+deb9u3 2:1.6.4-3+deb9u4
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
libx11-dev CVE-2021-31535 CRITICAL 2:1.6.4-3+deb9u3 2:1.6.4-3+deb9u4
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
libxdot4 CVE-2020-18032 HIGH 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2020-18032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
https://gitlab.com/graphviz/graphviz/-/issues/1700
https://linux.oracle.com/cve/CVE-2020-18032.html
https://linux.oracle.com/errata/ELSA-2021-4256.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
https://nvd.nist.gov/vuln/detail/CVE-2020-18032
https://security.gentoo.org/glsa/202107-04
https://ubuntu.com/security/notices/USN-5264-1
https://www.debian.org/security/2021/dsa-4914
libxdot4 CVE-2018-10196 MEDIUM 2.38.0-17 2.38.0-17+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2018-10196
https://bugzilla.redhat.com/show_bug.cgi?id=1579254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
https://gitlab.com/graphviz/graphviz/issues/1367
https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
https://ubuntu.com/security/notices/USN-5264-1
https://usn.ubuntu.com/3731-1/
libxdot4 CVE-2019-11023 LOW 2.38.0-17
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html
https://access.redhat.com/security/cve/CVE-2019-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023
https://gitlab.com/graphviz/graphviz/issues/1517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLEAHLDJVMAEGA3YMC7KPKJ7ZPXNMJID/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI3D5TQE3IMCSF5OUTXQL4GVKFCIY5JG/
https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/
https://ubuntu.com/security/notices/USN-5264-1
libxdot4 CVE-2019-9904 LOW 2.38.0-17
Expand...https://access.redhat.com/security/cve/CVE-2019-9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9904
https://gitlab.com/graphviz/graphviz/issues/1512
https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
libxml2 CVE-2017-16932 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2 CVE-2017-5130 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://bugzilla.gnome.org/show_bug.cgi?id=783026
http://www.securityfocus.com/bid/101482
https://access.redhat.com/errata/RHSA-2017:2997
https://access.redhat.com/security/cve/CVE-2017-5130
https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
https://crbug.com/722079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130
https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201710-24
https://security.netapp.com/advisory/ntap-20190719-0001/
https://www.oracle.com/security-alerts/cpuapr2020.html
libxml2 CVE-2021-3516 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2 CVE-2021-3517 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2021-3518 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2022-23308 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
libxml2 CVE-2016-9318 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2 CVE-2017-5969 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
libxml2 CVE-2021-3537 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2021-3541 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2 CVE-2022-29824 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
libxml2-dev CVE-2017-16932 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2-dev CVE-2017-5130 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://bugzilla.gnome.org/show_bug.cgi?id=783026
http://www.securityfocus.com/bid/101482
https://access.redhat.com/errata/RHSA-2017:2997
https://access.redhat.com/security/cve/CVE-2017-5130
https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
https://crbug.com/722079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130
https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201710-24
https://security.netapp.com/advisory/ntap-20190719-0001/
https://www.oracle.com/security-alerts/cpuapr2020.html
libxml2-dev CVE-2021-3516 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2-dev CVE-2021-3517 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-dev CVE-2021-3518 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-dev CVE-2022-23308 HIGH 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
libxml2-dev CVE-2016-9318 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2-dev CVE-2017-5969 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u6
Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
libxml2-dev CVE-2021-3537 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-dev CVE-2021-3541 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2-dev CVE-2022-29824 MEDIUM 2.9.4+dfsg1-2.2+deb9u3 2.9.4+dfsg1-2.2+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
libxslt1-dev CVE-2015-9019 LOW 1.1.29-2.1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
libxslt1.1 CVE-2015-9019 LOW 1.1.29-2.1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
linux-libc-dev CVE-2021-39713 CRITICAL 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-39713
https://android.googlesource.com/kernel/common/+/3a7d0d07a3867
https://android.googlesource.com/kernel/common/+/6f99528e97977
https://android.googlesource.com/kernel/common/+/86bd446b5cebd
https://android.googlesource.com/kernel/common/+/9d7e82cec35c0
https://android.googlesource.com/kernel/common/+/e368fdb61d8e7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://source.android.com/security/bulletin/pixel/2022-03-01
https://syzkaller.appspot.com/bug?id=d7e411c5472dd5da33d8cc921ccadc747743a568
https://ubuntu.com/security/notices/USN-5413-1
linux-libc-dev CVE-2013-7445 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
linux-libc-dev CVE-2018-12930 HIGH 4.9.246-2
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12930
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
linux-libc-dev CVE-2018-12931 HIGH 4.9.246-2
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12931
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
linux-libc-dev CVE-2018-25020 HIGH 4.9.246-2
Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://access.redhat.com/security/cve/CVE-2018-25020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25020
https://git.kernel.org/linus/050fad7c4534c13c8eb1d9c2ba66012e014773cb (4.17-rc7)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb
https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb
https://security.netapp.com/advisory/ntap-20211229-0005/
linux-libc-dev CVE-2019-0145 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0145
https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html
https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html
linux-libc-dev CVE-2019-19377 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
https://linux.oracle.com/cve/CVE-2019-19377.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4369-1
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
https://usn.ubuntu.com/4414-1/
linux-libc-dev CVE-2019-19378 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
linux-libc-dev CVE-2019-19449 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2019-19814 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
linux-libc-dev CVE-2019-19816 HIGH 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2019-19816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816
https://linux.oracle.com/cve/CVE-2019-19816.html
https://linux.oracle.com/errata/ELSA-2020-5995.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4709-1
https://usn.ubuntu.com/4414-1/
linux-libc-dev CVE-2019-2213 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2213
https://lore.kernel.org/patchwork/patch/1087916/
https://source.android.com/security/bulletin/2019-11-01
linux-libc-dev CVE-2020-0030 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-0030
https://source.android.com/security/bulletin/2020-02-01
linux-libc-dev CVE-2020-12362 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
linux-libc-dev CVE-2020-16119 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2020-16119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695
https://launchpad.net/bugs/1883840
https://linux.oracle.com/cve/CVE-2020-16119.html
https://linux.oracle.com/errata/ELSA-2021-9487.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/
https://security.netapp.com/advisory/ntap-20210304-0006/
https://ubuntu.com/USN-4576-1
https://ubuntu.com/USN-4577-1
https://ubuntu.com/USN-4578-1
https://ubuntu.com/USN-4579-1
https://ubuntu.com/USN-4580-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4578-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/USN-4580-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2020/10/13/7
linux-libc-dev CVE-2020-25670 HIGH 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2020/11/01/1
http://www.openwall.com/lists/oss-security/2021/05/11/4
https://access.redhat.com/security/cve/CVE-2020-25670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670
https://linux.oracle.com/cve/CVE-2020-25670.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
https://security.netapp.com/advisory/ntap-20210702-0008/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2020/11/01/1
linux-libc-dev CVE-2020-25671 HIGH 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2020/11/01/1
https://access.redhat.com/security/cve/CVE-2020-25671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671
https://linux.oracle.com/cve/CVE-2020-25671.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
https://security.netapp.com/advisory/ntap-20210702-0008/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2020/11/01/1
linux-libc-dev CVE-2020-25672 HIGH 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2020/11/01/1
https://access.redhat.com/security/cve/CVE-2020-25672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672
https://linux.oracle.com/cve/CVE-2020-25672.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
https://nvd.nist.gov/vuln/detail/CVE-2020-25672
https://security.netapp.com/advisory/ntap-20210702-0008/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2020/11/01/1
linux-libc-dev CVE-2020-27815 HIGH 4.9.246-2 4.9.258-1
Expand...http://www.openwall.com/lists/oss-security/2020/11/30/5
http://www.openwall.com/lists/oss-security/2020/12/28/1
https://access.redhat.com/security/cve/CVE-2020-27815
https://bugzilla.redhat.com/show_bug.cgi?id=1897668,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20210702-0004/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://www.debian.org/security/2021/dsa-4843
https://www.openwall.com/lists/oss-security/2020/11/30/5
https://www.openwall.com/lists/oss-security/2020/11/30/5,
https://www.openwall.com/lists/oss-security/2020/12/28/1,
linux-libc-dev CVE-2020-28374 HIGH 4.9.246-2 4.9.258-1
Expand...http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html
http://www.openwall.com/lists/oss-security/2021/01/13/2
http://www.openwall.com/lists/oss-security/2021/01/13/5
https://access.redhat.com/security/cve/CVE-2020-28374
https://bugzilla.suse.com/attachment.cgi?id=844938
https://bugzilla.suse.com/show_bug.cgi?id=1178372
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4
https://github.com/open-iscsi/tcmu-runner/pull/644
https://github.com/torvalds/linux/commit/2896c93811e39d63a4d9b63ccf12a8fbc226e5e4
https://linux.oracle.com/cve/CVE-2020-28374.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZEUPID5DZYLZBIO4BEVLHFUDZZIFL57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HK7SRTITN5ABAUOOIGFVR7XE5YKYYAVO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTGQDYIEO2GOCOOKADBHEITF44GY55QF/
https://nvd.nist.gov/vuln/detail/CVE-2020-28374
https://security.netapp.com/advisory/ntap-20210219-0002/
https://ubuntu.com/security/notices/USN-4694-1
https://ubuntu.com/security/notices/USN-4709-1
https://ubuntu.com/security/notices/USN-4711-1
https://ubuntu.com/security/notices/USN-4713-1
https://ubuntu.com/security/notices/USN-4713-2
https://ubuntu.com/security/notices/USN-4753-1
https://ubuntu.com/security/notices/USN-4901-1
https://www.debian.org/security/2021/dsa-4843
linux-libc-dev CVE-2020-29569 HIGH 4.9.246-2 4.9.258-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569
https://linux.oracle.com/cve/CVE-2020-29569.html
https://linux.oracle.com/errata/ELSA-2021-9038.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29569
https://security.gentoo.org/glsa/202107-30
https://security.netapp.com/advisory/ntap-20210205-0001/
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4876-1
https://www.debian.org/security/2021/dsa-4843
https://xenbits.xen.org/xsa/advisory-350.html
https://xenbits.xenproject.org/xsa/advisory-350.html
linux-libc-dev CVE-2020-29661 HIGH 4.9.246-2 4.9.258-1
Expand...http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html
http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
http://www.openwall.com/lists/oss-security/2020/12/10/1
https://access.redhat.com/security/cve/CVE-2020-29661
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661
https://git.kernel.org/linus/54ffccbf053b5b6ca4f6e45094b942fab92a25fc
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc
https://linux.oracle.com/cve/CVE-2020-29661.html
https://linux.oracle.com/errata/ELSA-2021-9212.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://nvd.nist.gov/vuln/detail/CVE-2020-29661
https://security.netapp.com/advisory/ntap-20210122-0001/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://ubuntu.com/security/notices/USN-5130-1
https://www.debian.org/security/2021/dsa-4843
https://www.oracle.com/security-alerts/cpuoct2021.html
linux-libc-dev CVE-2020-35519 HIGH 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2020-35519
https://bugzilla.redhat.com/show_bug.cgi?id=1908251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35519
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ee50c8e262a0f0693dad264c3c99e30e6442a56
https://seclists.org/oss-sec/2021/q1/228
https://security.netapp.com/advisory/ntap-20210618-0009/
https://ubuntu.com/security/notices/USN-4947-1
linux-libc-dev CVE-2020-36385 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-36385
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385
https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
https://linux.oracle.com/cve/CVE-2020-36385.html
https://linux.oracle.com/errata/ELSA-2021-4777.html
https://security.netapp.com/advisory/ntap-20210720-0004/
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-0512 HIGH 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-0512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512
https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f
https://linux.oracle.com/cve/CVE-2021-0512.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/
https://source.android.com/security/bulletin/2021-06-01
linux-libc-dev CVE-2021-20322 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-20322
https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
https://linux.oracle.com/cve/CVE-2021-20322.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20322
https://security.netapp.com/advisory/ntap-20220303-0002/
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-22543 HIGH 4.9.246-2 4.9.290-1
Expand...http://www.openwall.com/lists/oss-security/2021/06/26/1
https://access.redhat.com/security/cve/CVE-2021-22543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543
https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584
https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97
https://linux.oracle.com/cve/CVE-2021-22543.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/
https://security.netapp.com/advisory/ntap-20210708-0002/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://www.openwall.com/lists/oss-security/2021/05/26/3
https://www.openwall.com/lists/oss-security/2021/05/26/4
https://www.openwall.com/lists/oss-security/2021/05/26/5
linux-libc-dev CVE-2021-22555 HIGH 4.9.246-2 4.9.272-1
Expand...http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html
http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://access.redhat.com/security/cve/CVE-2021-22555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d
https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528
https://linux.oracle.com/cve/CVE-2021-22555.html
https://linux.oracle.com/errata/ELSA-2021-9395.html
https://security.netapp.com/advisory/ntap-20210805-0010/
https://ubuntu.com/security/notices/USN-5039-1
linux-libc-dev CVE-2021-23133 HIGH 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/10/1
http://www.openwall.com/lists/oss-security/2021/05/10/2
http://www.openwall.com/lists/oss-security/2021/05/10/3
http://www.openwall.com/lists/oss-security/2021/05/10/4
https://access.redhat.com/security/cve/CVE-2021-23133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://linux.oracle.com/cve/CVE-2021-23133.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-23133
https://security.netapp.com/advisory/ntap-20210611-0008/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5003-1
https://www.openwall.com/lists/oss-security/2021/04/18/2
linux-libc-dev CVE-2021-23134 HIGH 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-23134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134
https://git.kernel.org/linus/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
https://linux.oracle.com/cve/CVE-2021-23134.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZYORWNQIHNWRFYRDXBWYWBYM46PDZEN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QALNQT4LJFVSSA3MWCIECVY4AFPP4X77/
https://nvd.nist.gov/vuln/detail/CVE-2021-23134
https://security.netapp.com/advisory/ntap-20210625-0007/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5016-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/05/11/4
linux-libc-dev CVE-2021-26930 HIGH 4.9.246-2 4.9.258-1
Expand...http://xenbits.xen.org/xsa/advisory-365.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26930
https://linux.oracle.com/cve/CVE-2021-26930.html
https://linux.oracle.com/errata/ELSA-2021-9136.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
https://nvd.nist.gov/vuln/detail/CVE-2021-26930
https://security.netapp.com/advisory/ntap-20210326-0001/
https://ubuntu.com/security/notices/USN-4904-1
https://ubuntu.com/security/notices/USN-4909-1
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4949-1
https://www.openwall.com/lists/oss-security/2021/02/16/6
linux-libc-dev CVE-2021-27364 HIGH 4.9.246-2 4.9.258-1
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2021-27364
https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
https://bugzilla.suse.com/show_bug.cgi?id=1182717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364
https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
https://linux.oracle.com/cve/CVE-2021-27364.html
https://linux.oracle.com/errata/ELSA-2021-9212.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27364
https://security.netapp.com/advisory/ntap-20210409-0001/
https://ubuntu.com/security/notices/USN-4883-1
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4889-1
https://ubuntu.com/security/notices/USN-4901-1
https://www.openwall.com/lists/oss-security/2021/03/06/1
https://www.oracle.com/security-alerts/cpuoct2021.html
linux-libc-dev CVE-2021-27365 HIGH 4.9.246-2 4.9.258-1
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2021-27365
https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
https://bugzilla.suse.com/show_bug.cgi?id=1182715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365
https://git.kernel.org/linus/ec98ea7070e94cc25a422ec97d1421e28d97b7ee
https://git.kernel.org/linus/f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5
https://linux.oracle.com/cve/CVE-2021-27365.html
https://linux.oracle.com/errata/ELSA-2021-9212.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27365
https://security.netapp.com/advisory/ntap-20210409-0001/
https://ubuntu.com/security/notices/USN-4883-1
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4889-1
https://ubuntu.com/security/notices/USN-4901-1
https://www.openwall.com/lists/oss-security/2021/03/06/1
https://www.oracle.com/security-alerts/cpuoct2021.html
linux-libc-dev CVE-2021-28660 HIGH 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-28660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/
https://nvd.nist.gov/vuln/detail/CVE-2021-28660
https://security.netapp.com/advisory/ntap-20210507-0008/
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4984-1
linux-libc-dev CVE-2021-29154 HIGH 4.9.246-2 4.9.272-1
Expand...http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html
https://access.redhat.com/security/cve/CVE-2021-29154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=26f55a59dc65ff77cd1c4b37991e26497fc68049
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=e4d4d456436bfb2fe412ee2cd489f7658449b098
https://linux.oracle.com/cve/CVE-2021-29154.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/
https://news.ycombinator.com/item?id=26757760
https://nvd.nist.gov/vuln/detail/CVE-2021-29154
https://security.netapp.com/advisory/ntap-20210604-0006/
https://ubuntu.com/security/notices/USN-4912-1
https://ubuntu.com/security/notices/USN-4916-1
https://ubuntu.com/security/notices/USN-4917-1
https://www.openwall.com/lists/oss-security/2021/04/08/1
linux-libc-dev CVE-2021-32399 HIGH 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/2
https://access.redhat.com/security/cve/CVE-2021-32399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80
https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80
https://linux.oracle.com/cve/CVE-2021-32399.html
https://linux.oracle.com/errata/ELSA-2021-9395.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32399
https://security.netapp.com/advisory/ntap-20210622-0006/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5016-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/05/11/2
linux-libc-dev CVE-2021-33033 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-33033
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033
https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/linus/ad5d07f4a9cd671233ae20983848874731102c08
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08
https://linux.oracle.com/cve/CVE-2021-33033.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33033
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-cipso_v4_genopt
https://syzkaller.appspot.com/bug?id=96e7d345748d8814901c91cd92084ed04b46701e
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-33034 HIGH 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-33034
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034
https://git.kernel.org/linus/5c4c8c9544099bb9043a10a5318130a943e32fc3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3
https://linux.oracle.com/cve/CVE-2021-33034.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/
https://nvd.nist.gov/vuln/detail/CVE-2021-33034
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl
https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5016-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-3347 HIGH 4.9.246-2 4.9.258-1
Expand...http://www.openwall.com/lists/oss-security/2021/01/29/4
http://www.openwall.com/lists/oss-security/2021/01/29/5
http://www.openwall.com/lists/oss-security/2021/02/01/4
https://access.redhat.com/security/cve/CVE-2021-3347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
https://linux.oracle.com/cve/CVE-2021-3347.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3347
https://security.netapp.com/advisory/ntap-20210304-0005/
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4884-1
https://ubuntu.com/security/notices/USN-4907-1
https://ubuntu.com/security/notices/USN-4910-1
https://www.debian.org/security/2021/dsa-4843
https://www.openwall.com/lists/oss-security/2021/01/29/1
https://www.openwall.com/lists/oss-security/2021/01/29/3
linux-libc-dev CVE-2021-33909 HIGH 4.9.246-2 4.9.272-2
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
http://www.openwall.com/lists/oss-security/2021/07/22/7
http://www.openwall.com/lists/oss-security/2021/08/25/10
http://www.openwall.com/lists/oss-security/2021/09/17/2
http://www.openwall.com/lists/oss-security/2021/09/17/4
http://www.openwall.com/lists/oss-security/2021/09/21/1
https://access.redhat.com/security/cve/CVE-2021-33909
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
https://linux.oracle.com/cve/CVE-2021-33909.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
https://nvd.nist.gov/vuln/detail/CVE-2021-33909
https://security.netapp.com/advisory/ntap-20210819-0004/
https://ubuntu.com/security/notices/USN-5014-1
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5016-1
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/07/20/1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
linux-libc-dev CVE-2021-3483 HIGH 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/04/07/1
https://access.redhat.com/security/cve/CVE-2021-3483
https://bugzilla.redhat.com/show_bug.cgi?id=1948045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483
https://git.kernel.org/linus/829933ef05a951c8ff140e814656d73e74915fa
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3483
https://security.netapp.com/advisory/ntap-20210629-0002/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/04/07/1
linux-libc-dev CVE-2021-34981 HIGH 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
linux-libc-dev CVE-2021-3506 HIGH 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/05/08/1
https://access.redhat.com/security/cve/CVE-2021-3506
https://bugzilla.redhat.com/show_bug.cgi?id=1944298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3506
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lore.kernel.org/lkml/20210322114730.71103-1-yuchao0@huawei.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-3506
https://security.netapp.com/advisory/ntap-20210611-0007/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5016-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2520013.html
https://www.openwall.com/lists/oss-security/2021/03/28/2
linux-libc-dev CVE-2021-3600 HIGH 4.9.246-2
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
https://linux.oracle.com/cve/CVE-2021-3600.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lore.kernel.org/patchwork/patch/1379497/
https://ubuntu.com/security/notices/USN-5003-1
https://www.openwall.com/lists/oss-security/2021/06/23/1
linux-libc-dev CVE-2021-3609 HIGH 4.9.246-2 4.9.272-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3609
https://bugzilla.redhat.com/show_bug.cgi?id=1971651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md
https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463
https://linux.oracle.com/cve/CVE-2021-3609.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t
https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-3609
https://security.netapp.com/advisory/ntap-20220419-0004/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5002-1
https://ubuntu.com/security/notices/USN-5003-1
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/06/19/1
linux-libc-dev CVE-2021-3612 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3612
https://bugzilla.redhat.com/show_bug.cgi?id=1974079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3612.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u
https://security.netapp.com/advisory/ntap-20210805-0005/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-3640 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3640
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://linux.oracle.com/cve/CVE-2021-3640.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lkml.org/lkml/2021/8/28/238
https://nvd.nist.gov/vuln/detail/CVE-2021-3640
https://security.netapp.com/advisory/ntap-20220419-0003/
https://ubuntu.com/security/CVE-2021-3640
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/07/22/1
https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/
https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/
https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
linux-libc-dev CVE-2021-3653 HIGH 4.9.246-2 4.9.290-1
Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://access.redhat.com/security/cve/CVE-2021-3653
https://bugzilla.redhat.com/show_bug.cgi?id=1983686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
https://github.com/torvalds/linux/commit/3d6368ef580a
https://linux.oracle.com/cve/CVE-2021-3653.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3653
https://ubuntu.com/security/notices/USN-5062-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
linux-libc-dev CVE-2021-3752 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3752
https://bugzilla.redhat.com/show_bug.cgi?id=1999544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3752.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-3752
https://security.netapp.com/advisory/ntap-20220318-0009/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/4
linux-libc-dev CVE-2021-37576 HIGH 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2
https://access.redhat.com/security/cve/CVE-2021-37576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://linux.oracle.com/cve/CVE-2021-37576.html
https://linux.oracle.com/errata/ELSA-2021-3801.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/
https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-37576
https://security.netapp.com/advisory/ntap-20210917-0005/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2021/07/26/1
linux-libc-dev CVE-2021-3760 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3760
https://bugzilla.redhat.com/show_bug.cgi?id=2000585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220318-0007/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/10/26/2
linux-libc-dev CVE-2021-38160 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-38160
https://access.redhat.com/security/cve/cve-2021-38160
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160
https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46
https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
https://linux.oracle.com/cve/CVE-2021-38160.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38160
https://security.netapp.com/advisory/ntap-20210902-0010/
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
linux-libc-dev CVE-2021-38207 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-38207
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207
https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
https://nvd.nist.gov/vuln/detail/CVE-2021-38207
https://security.netapp.com/advisory/ntap-20210902-0007/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5120-1
linux-libc-dev CVE-2021-38300 HIGH 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/09/15/5
https://access.redhat.com/security/cve/CVE-2021-38300
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/bpf/20210915160437.4080-1-piotras@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-38300
https://security.netapp.com/advisory/ntap-20211008-0003/
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/5
linux-libc-dev CVE-2021-3847 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3847
https://bugzilla.redhat.com/show_bug.cgi?id=2009704
https://nvd.nist.gov/vuln/detail/CVE-2021-3847
https://www.openwall.com/lists/oss-security/2021/10/14/3
linux-libc-dev CVE-2021-3864 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
linux-libc-dev CVE-2021-39685 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-39685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a
https://github.com/szymonh/inspector-gadget
https://gitlab.com/postmarketOS/pmaports/-/issues/1346
https://linux.oracle.com/cve/CVE-2021-39685.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://source.android.com/security/bulletin/2022-03-01
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.openwall.com/lists/oss-security/2021/12/15/4
linux-libc-dev CVE-2021-39686 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-39686
https://android.googlesource.com/kernel/common/+/11db2de0af2a
https://android.googlesource.com/kernel/common/+/3af7a2f61023
https://android.googlesource.com/kernel/common/+/a4eacf3227bd
https://android.googlesource.com/kernel/common/+/d49297739550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
https://source.android.com/security/bulletin/2022-03-01
linux-libc-dev CVE-2021-39698 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-39698
https://android.googlesource.com/kernel/common/+/363bee27e258
https://android.googlesource.com/kernel/common/+/42288cb44c4b
https://android.googlesource.com/kernel/common/+/50252e4b5e98
https://android.googlesource.com/kernel/common/+/9537bae0da1f
https://android.googlesource.com/kernel/common/+/a880b28a71e3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
https://lore.kernel.org/all/20211209010455.42744-2-ebiggers@kernel.org/
https://lore.kernel.org/all/20211210235312.40412-5-ebiggers@kernel.org/
https://source.android.com/security/bulletin/2022-03-01
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
linux-libc-dev CVE-2021-39714 HIGH 4.9.246-2 4.9.303-1
Expand...https://android.googlesource.com/kernel/common/+/16b34e53eaadd%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39714
https://source.android.com/security/bulletin/pixel/2022-03-01
linux-libc-dev CVE-2021-40490 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-40490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
https://linux.oracle.com/cve/CVE-2021-40490.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-40490
https://security.netapp.com/advisory/ntap-20211004-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
linux-libc-dev CVE-2021-4083 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-4083
https://bugzilla.redhat.com/show_bug.cgi?id=2029923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
https://linux.oracle.com/cve/CVE-2021-4083.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4083
https://security.netapp.com/advisory/ntap-20220217-0005/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5361-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-4157 HIGH 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-4157
https://bugzilla.redhat.com/show_bug.cgi?id=2034342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)
https://linux.oracle.com/cve/CVE-2021-4157.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-4157
https://ubuntu.com/security/notices/USN-5413-1
linux-libc-dev CVE-2021-41864 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-41864
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://linux.oracle.com/cve/CVE-2021-41864.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-41864
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-4197 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-4197
https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-4197.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4197
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.debian.org/security/2022/dsa-5127
linux-libc-dev CVE-2021-42008 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-42008
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008
https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42008
https://security.netapp.com/advisory/ntap-20211104-0002/
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.youtube.com/watch?v=d5f9xLK8Vhw
linux-libc-dev CVE-2021-4202 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-4202
https://bugzilla.redhat.com/show_bug.cgi?id=2036682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15
https://nvd.nist.gov/vuln/detail/CVE-2021-4202
https://security.netapp.com/advisory/ntap-20220513-0002/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
linux-libc-dev CVE-2021-45469 HIGH 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/12/25/1
https://access.redhat.com/security/cve/CVE-2021-45469
https://bugzilla.kernel.org/show_bug.cgi?id=215235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-45469
https://security.netapp.com/advisory/ntap-20220114-0003/
https://ubuntu.com/security/notices/USN-5343-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-45485 HIGH 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-45485
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
https://linux.oracle.com/cve/CVE-2021-45485.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/
https://nvd.nist.gov/vuln/detail/CVE-2021-45485
https://security.netapp.com/advisory/ntap-20220121-0001/
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2022-0330 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json
https://access.redhat.com/security/cve/CVE-2022-0330
https://bugzilla.redhat.com/show_bug.cgi?id=2042404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://linux.oracle.com/cve/CVE-2022-0330.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0330
https://security.netapp.com/advisory/ntap-20220526-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/25/12
linux-libc-dev CVE-2022-0435 HIGH 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json
https://access.redhat.com/security/cve/CVE-2022-0435
https://bugzilla.redhat.com/show_bug.cgi?id=2048738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://linux.oracle.com/cve/CVE-2022-0435.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0435
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5362-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.openwall.com/lists/oss-security/2022/02/10/1
linux-libc-dev CVE-2022-0492 HIGH 4.9.246-2 4.9.303-1
Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json
https://access.redhat.com/security/cve/CVE-2022-0492
https://bugzilla.redhat.com/show_bug.cgi?id=2051505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
https://linux.oracle.com/cve/CVE-2022-0492.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0492
https://security.netapp.com/advisory/ntap-20220419-0002/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://ubuntu.com/security/notices/USN-5362-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2022/02/04/1
linux-libc-dev CVE-2022-1011 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
linux-libc-dev CVE-2022-1012 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
linux-libc-dev CVE-2022-1048 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
linux-libc-dev CVE-2022-1247 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1247
linux-libc-dev CVE-2022-1353 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1353
https://bugzilla.redhat.com/show_bug.cgi?id=2066819
https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c
https://nvd.nist.gov/vuln/detail/CVE-2022-1353
https://www.debian.org/security/2022/dsa-5127
linux-libc-dev CVE-2022-1679 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1679
https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
linux-libc-dev CVE-2022-1729 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1729
https://linux.oracle.com/cve/CVE-2022-1729.html
https://linux.oracle.com/errata/ELSA-2022-9413.html
linux-libc-dev CVE-2022-1786 HIGH 4.9.246-2
Expand...https://linux.oracle.com/cve/CVE-2022-1786.html
https://linux.oracle.com/errata/ELSA-2022-9426.html
linux-libc-dev CVE-2022-23036 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://ubuntu.com/security/notices/USN-5418-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-23037 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://ubuntu.com/security/notices/USN-5418-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-23038 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://ubuntu.com/security/notices/USN-5418-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-23039 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://ubuntu.com/security/notices/USN-5418-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-23040 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://ubuntu.com/security/notices/USN-5418-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-23041 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-23042 HIGH 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
https://ubuntu.com/security/notices/USN-5418-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
linux-libc-dev CVE-2022-24958 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-24958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://nvd.nist.gov/vuln/detail/CVE-2022-24958
https://security.netapp.com/advisory/ntap-20220225-0008/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5418-1
linux-libc-dev CVE-2022-26490 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-26490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)
https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://nvd.nist.gov/vuln/detail/CVE-2022-26490
https://security.netapp.com/advisory/ntap-20220429-0004/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://www.debian.org/security/2022/dsa-5127
linux-libc-dev CVE-2022-27223 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-27223
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223
https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)
https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d
https://nvd.nist.gov/vuln/detail/CVE-2022-27223
https://security.netapp.com/advisory/ntap-20220419-0001/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
linux-libc-dev CVE-2022-28356 HIGH 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2022/04/06/1
https://access.redhat.com/security/cve/CVE-2022-28356
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
https://git.kernel.org/linus/764f4eb6846f5475f1244767d24d25dd86528a4a
https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a
https://nvd.nist.gov/vuln/detail/CVE-2022-28356
https://security.netapp.com/advisory/ntap-20220506-0006/
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/04/06/1
linux-libc-dev CVE-2022-28388 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
linux-libc-dev CVE-2022-28390 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
linux-libc-dev CVE-2022-30594 HIGH 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
linux-libc-dev CVE-2017-18232 MEDIUM 4.9.246-2
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0558f33c06bb910e2879e355192227a8e8f0219d
http://www.securityfocus.com/bid/103423
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2017-18232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
https://github.com/torvalds/linux/commit/0558f33c06bb910e2879e355192227a8e8f0219d
https://linux.oracle.com/cve/CVE-2017-18232.html
https://linux.oracle.com/errata/ELSA-2018-3083.html
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.debian.org/security/2018/dsa-4187
linux-libc-dev CVE-2018-10322 MEDIUM 4.9.246-2
Expand...http://www.securityfocus.com/bid/103960
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10322
https://bugzilla.kernel.org/show_bug.cgi?id=199377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322
https://linux.oracle.com/cve/CVE-2018-10322.html
https://linux.oracle.com/errata/ELSA-2019-4509.html
https://ubuntu.com/security/notices/USN-4578-1
https://ubuntu.com/security/notices/USN-4579-1
https://usn.ubuntu.com/4578-1/
https://usn.ubuntu.com/4579-1/
https://www.spinics.net/lists/linux-xfs/msg17215.html
linux-libc-dev CVE-2018-1108 MEDIUM 4.9.246-2
Expand...http://www.securityfocus.com/bid/104055
https://access.redhat.com/security/cve/CVE-2018-1108
https://bugs.chromium.org/p/project-zero/issues/detail?id=1559
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3718-1/
https://usn.ubuntu.com/3718-2/
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://www.debian.org/security/2018/dsa-4188
linux-libc-dev CVE-2018-12929 MEDIUM 4.9.246-2
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12929
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
linux-libc-dev CVE-2018-13095 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/errata/RHSA-2019:1350
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/security/cve/CVE-2018-13095
https://bugzilla.kernel.org/show_bug.cgi?id=199915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095
https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3
https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3
https://linux.oracle.com/cve/CVE-2018-13095.html
https://linux.oracle.com/errata/ELSA-2019-2029.html
https://ubuntu.com/security/notices/USN-4904-1
https://ubuntu.com/security/notices/USN-4907-1
linux-libc-dev CVE-2018-20449 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2018-20449
https://elixir.bootlin.com/linux/v4.14.90/source/drivers/dma/qcom/hidma_dbg.c#L92
https://security.netapp.com/advisory/ntap-20190502-0002/
https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03808.html
linux-libc-dev CVE-2018-7273 MEDIUM 4.9.246-2
Expand...http://www.securityfocus.com/bid/103088
https://access.redhat.com/security/cve/CVE-2018-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273
https://lkml.org/lkml/2018/2/20/669
https://www.exploit-db.com/exploits/44325/
linux-libc-dev CVE-2018-7754 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2018-7754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7754
https://elixir.bootlin.com/linux/v4.16-rc4/source/drivers/block/aoe/aoeblk.c#L421
https://github.com/johnsonwangqize/cve-linux/blob/master/CVE-2018-7754.md
linux-libc-dev CVE-2019-0146 MEDIUM 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0146
https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html
https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html
linux-libc-dev CVE-2019-0147 MEDIUM 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0147
https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html
https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html
linux-libc-dev CVE-2019-0148 MEDIUM 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0148
https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20200810/021006.html
https://lore.kernel.org/stable/20200807205517.1740307-1-jesse.brandeburg@intel.com/
https://ubuntu.com/security/notices/USN-4681-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html
linux-libc-dev CVE-2019-0149 MEDIUM 4.9.246-2
Expand...https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html
linux-libc-dev CVE-2019-12984 MEDIUM 4.9.246-2
Expand...http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
http://www.securityfocus.com/bid/108905
https://access.redhat.com/security/cve/CVE-2019-12984
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51
https://seclists.org/bugtraq/2019/Aug/13
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
linux-libc-dev CVE-2019-19036 MEDIUM 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4439-1/
linux-libc-dev CVE-2019-19039 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4414-1/
linux-libc-dev CVE-2019-19318 MEDIUM 4.9.246-2 4.9.258-1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19318
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://usn.ubuntu.com/4414-1/
linux-libc-dev CVE-2019-19813 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2019-19813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19813
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813
https://linux.oracle.com/cve/CVE-2019-19813.html
https://linux.oracle.com/errata/ELSA-2021-9534.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4709-1
https://usn.ubuntu.com/4414-1/
linux-libc-dev CVE-2019-20794 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://access.redhat.com/security/cve/CVE-2019-20794
https://github.com/sargun/fuse-example
https://nvd.nist.gov/vuln/detail/CVE-2019-20794
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
linux-libc-dev CVE-2019-20908 MEDIUM 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://www.openwall.com/lists/oss-security/2020/07/20/6
http://www.openwall.com/lists/oss-security/2020/07/29/3
http://www.openwall.com/lists/oss-security/2020/07/30/2
http://www.openwall.com/lists/oss-security/2020/07/30/3
https://access.redhat.com/security/cve/CVE-2019-20908
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20908
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e
https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh
https://linux.oracle.com/cve/CVE-2019-20908.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lore.kernel.org/linux-efi/20200615202408.2242614-1-pjones@redhat.com/
https://mailarchives.bentasker.co.uk/Mirrors/OSSSec/2020/06-Jun/msg00035.html
https://ubuntu.com/security/notices/USN-4426-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4426-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://www.openwall.com/lists/oss-security/2020/06/14/1
linux-libc-dev CVE-2019-3874 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-3874
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911
https://linux.oracle.com/cve/CVE-2019-3874.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u
https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/
https://security.netapp.com/advisory/ntap-20190411-0003/
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://ubuntu.com/security/notices/USN-3982-1
https://ubuntu.com/security/notices/USN-3982-2
https://usn.ubuntu.com/3979-1/
https://usn.ubuntu.com/3980-1/
https://usn.ubuntu.com/3980-2/
https://usn.ubuntu.com/3981-1/
https://usn.ubuntu.com/3981-2/
https://usn.ubuntu.com/3982-1/
https://usn.ubuntu.com/3982-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
linux-libc-dev CVE-2019-9245 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-9245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9245
https://git.kernel.org/linus/64beba0558fce7b59e9a8a7afd77290e82a22163
https://source.android.com/security/bulletin/pixel/2019-09-01
linux-libc-dev CVE-2019-9444 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-9444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9444
https://lore.kernel.org/patchwork/patch/902287/
https://source.android.com/security/bulletin/pixel/2019-09-01
linux-libc-dev CVE-2019-9453 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-9453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9453
https://git.kernel.org/linus/2777e654371dd4207a3a7f4fb5fa39550053a080
https://source.android.com/security/bulletin/pixel/2019-09-01
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4527-1/
linux-libc-dev CVE-2020-0067 MEDIUM 4.9.246-2
Expand...http://android.googlesource.com/kernel/common/+/688078e7
http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
https://access.redhat.com/security/cve/CVE-2020-0067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0067
https://git.kernel.org/linus/688078e7f36c293dae25b338ddc9e0a2790f6e06
https://source.android.com/security/bulletin/pixel/2020-04-01
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4527-1/
linux-libc-dev CVE-2020-12363 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
linux-libc-dev CVE-2020-12364 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
linux-libc-dev CVE-2020-14304 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
linux-libc-dev CVE-2020-15780 MEDIUM 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
http://www.openwall.com/lists/oss-security/2020/07/20/7
http://www.openwall.com/lists/oss-security/2020/07/29/3
http://www.openwall.com/lists/oss-security/2020/07/30/2
http://www.openwall.com/lists/oss-security/2020/07/30/3
https://access.redhat.com/security/cve/CVE-2020-15780
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
https://linux.oracle.com/cve/CVE-2020-15780.html
https://linux.oracle.com/errata/ELSA-2020-5792.html
https://nvd.nist.gov/vuln/detail/CVE-2020-15780
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4426-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4426-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://www.openwall.com/lists/oss-security/2020/06/15/3
linux-libc-dev CVE-2020-15802 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-15802
https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
linux-libc-dev CVE-2020-25673 MEDIUM 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2020/11/01/1
https://access.redhat.com/security/cve/CVE-2020-25673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
https://security.netapp.com/advisory/ntap-20210702-0008/
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2020/11/01/1
linux-libc-dev CVE-2020-26139 MEDIUM 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26139
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26139.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
linux-libc-dev CVE-2020-26141 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26141
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
linux-libc-dev CVE-2020-26145 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26145
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26145.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.fragattacks.com
linux-libc-dev CVE-2020-26147 MEDIUM 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26147
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26147.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
linux-libc-dev CVE-2020-26555 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-26555
https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
linux-libc-dev CVE-2020-26558 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2020-26558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
https://kb.cert.org/vuls/id/799380
https://linux.oracle.com/cve/CVE-2020-26558.html
https://linux.oracle.com/errata/ELSA-2021-4432.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://nvd.nist.gov/vuln/detail/CVE-2020-26558
https://ubuntu.com/security/notices/USN-4989-1
https://ubuntu.com/security/notices/USN-4989-2
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.debian.org/security/2021/dsa-4951
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
linux-libc-dev CVE-2020-27777 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-27777
https://bugzilla.redhat.com/show_bug.cgi?id=1900844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777
https://git.kernel.org/linus/bd59380c5ba4147dcbaad3e582b55ccfd120b764
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764
https://linux.oracle.com/cve/CVE-2020-27777.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lkml.org/lkml/2020/12/8/950
https://nvd.nist.gov/vuln/detail/CVE-2020-27777
https://ubuntu.com/security/notices/USN-4679-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4751-1
https://www.openwall.com/lists/oss-security/2020/10/09/1
https://www.openwall.com/lists/oss-security/2020/11/23/2
linux-libc-dev CVE-2020-27825 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2020-27825
https://bugzilla.redhat.com/show_bug.cgi?id=1905155
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20210521-0008/
https://www.debian.org/security/2021/dsa-4843
linux-libc-dev CVE-2020-27835 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
linux-libc-dev CVE-2020-29568 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568
https://linux.oracle.com/cve/CVE-2020-29568.html
https://linux.oracle.com/errata/ELSA-2021-9038.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.gentoo.org/glsa/202107-30
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://www.debian.org/security/2021/dsa-4843
https://xenbits.xen.org/xsa/advisory-349.html
https://xenbits.xenproject.org/xsa/advisory-349.html
linux-libc-dev CVE-2020-29660 MEDIUM 4.9.246-2 4.9.258-1
Expand...http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
http://www.openwall.com/lists/oss-security/2020/12/10/1
https://access.redhat.com/security/cve/CVE-2020-29660
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://linux.oracle.com/cve/CVE-2020-29660.html
https://linux.oracle.com/errata/ELSA-2021-9039.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://nvd.nist.gov/vuln/detail/CVE-2020-29660
https://security.netapp.com/advisory/ntap-20210122-0001/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://ubuntu.com/security/notices/USN-5130-1
https://www.debian.org/security/2021/dsa-4843
linux-libc-dev CVE-2020-36158 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2020-36158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d
https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1)
https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d
https://linux.oracle.com/cve/CVE-2020-36158.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/
https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com
https://nvd.nist.gov/vuln/detail/CVE-2020-36158
https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/
https://security.netapp.com/advisory/ntap-20210212-0002/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4879-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.debian.org/security/2021/dsa-4843
linux-libc-dev CVE-2020-36322 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2020-36322
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://git.kernel.org/linus/5d069dbe8aaf2a197142558b6fb2978189ba3454
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454
https://linux.oracle.com/cve/CVE-2020-36322.html
https://linux.oracle.com/errata/ELSA-2022-0063.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2020-36516 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-36516
https://dl.acm.org/doi/10.1145/3372297.3417884
https://linux.oracle.com/cve/CVE-2020-36516.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://security.netapp.com/advisory/ntap-20220331-0003/
https://www.spinics.net/lists/netdev/msg795642.html
linux-libc-dev CVE-2020-3702 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2020-3702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/
https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58
https://www.debian.org/security/2021/dsa-4978
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
linux-libc-dev CVE-2020-4788 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2020/11/20/3
http://www.openwall.com/lists/oss-security/2020/11/23/1
https://access.redhat.com/security/cve/CVE-2020-4788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/189296
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c
https://linux.oracle.com/cve/CVE-2020-4788.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4681-1
https://www.ibm.com/support/pages/node/6370729
https://www.openwall.com/lists/oss-security/2020/11/20/3
linux-libc-dev CVE-2021-0129 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f
https://linux.oracle.com/cve/CVE-2021-0129.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://security.netapp.com/advisory/ntap-20210716-0002/
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4951
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
linux-libc-dev CVE-2021-0920 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-0920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca
https://linux.oracle.com/cve/CVE-2021-0920.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://source.android.com/security/bulletin/2021-11-01
https://ubuntu.com/security/notices/USN-5361-1
linux-libc-dev CVE-2021-0935 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2021-0935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0935
https://git.kernel.org/linus/2f987a76a97773beafbc615b9c4d8fe79129a7f4
https://git.kernel.org/linus/b954f94023dcc61388c8384f0f14eb8e42c863c5
https://groups.google.com/g/syzkaller-bugs/c/N53POqzMUa0/m/bTV9futJBAAJ
https://source.android.com/security/bulletin/pixel/2021-10-01
https://ubuntu.com/security/notices/USN-5361-1
linux-libc-dev CVE-2021-0937 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0937
https://git.kernel.org/linus/b29c457a6511435960115c0f548c4360d5f4801d
https://source.android.com/security/bulletin/pixel/2021-10-01
linux-libc-dev CVE-2021-0941 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-0941
https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0941
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/6306c1189e77a513bf02720450bb43bd4ba5d8ae
https://linux.oracle.com/cve/CVE-2021-0941.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://source.android.com/security/bulletin/pixel/2021-10-01
linux-libc-dev CVE-2021-20292 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-20292
https://bugzilla.redhat.com/show_bug.cgi?id=1939686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20292
https://git.kernel.org/linus/5de5b6ecf97a021f29403aa272cb4e03318ef586
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-20317 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json
https://access.redhat.com/security/cve/CVE-2021-20317
https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-20320 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
linux-libc-dev CVE-2021-20321 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-20321
https://bugzilla.redhat.com/show_bug.cgi?id=2013242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://linux.oracle.com/cve/CVE-2021-20321.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-20321
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-26401 MEDIUM 4.9.246-2 4.9.303-1
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://access.redhat.com/security/cve/CVE-2021-26401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-26401.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036
linux-libc-dev CVE-2021-26931 MEDIUM 4.9.246-2 4.9.258-1
Expand...http://xenbits.xen.org/xsa/advisory-362.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26931
https://linux.oracle.com/cve/CVE-2021-26931.html
https://linux.oracle.com/errata/ELSA-2021-9136.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
https://nvd.nist.gov/vuln/detail/CVE-2021-26931
https://security.netapp.com/advisory/ntap-20210326-0001/
https://ubuntu.com/security/notices/USN-4904-1
https://ubuntu.com/security/notices/USN-4909-1
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4949-1
https://www.openwall.com/lists/oss-security/2021/02/16/4
https://xenbits.xen.org/xsa/advisory-362.html
linux-libc-dev CVE-2021-26932 MEDIUM 4.9.246-2 4.9.258-1
Expand...http://xenbits.xen.org/xsa/advisory-361.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932
https://linux.oracle.com/cve/CVE-2021-26932.html
https://linux.oracle.com/errata/ELSA-2021-9136.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
https://nvd.nist.gov/vuln/detail/CVE-2021-26932
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/3
https://xenbits.xen.org/xsa/advisory-361.html
linux-libc-dev CVE-2021-27363 MEDIUM 4.9.246-2 4.9.258-1
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
http://www.openwall.com/lists/oss-security/2021/03/06/1
https://access.redhat.com/security/cve/CVE-2021-27363
https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
https://bugzilla.suse.com/show_bug.cgi?id=1182716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363
https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
https://linux.oracle.com/cve/CVE-2021-27363.html
https://linux.oracle.com/errata/ELSA-2021-9175.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27363
https://security.netapp.com/advisory/ntap-20210409-0001/
https://ubuntu.com/security/notices/USN-4883-1
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4889-1
https://ubuntu.com/security/notices/USN-4901-1
https://www.openwall.com/lists/oss-security/2021/03/06/1
linux-libc-dev CVE-2021-28038 MEDIUM 4.9.246-2 4.9.258-1
Expand...http://www.openwall.com/lists/oss-security/2021/03/05/1
http://xenbits.xen.org/xsa/advisory-367.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28038
https://linux.oracle.com/cve/CVE-2021-28038.html
https://linux.oracle.com/errata/ELSA-2021-9221.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://security.netapp.com/advisory/ntap-20210409-0001/
https://ubuntu.com/security/notices/USN-4904-1
https://ubuntu.com/security/notices/USN-4911-1
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4984-1
https://xenbits.xen.org/xsa/advisory-367.html
linux-libc-dev CVE-2021-28688 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688
https://git.kernel.org/linus/a846738f8c3788d846ed1f587270d2f2e3d32432
https://linux.oracle.com/cve/CVE-2021-28688.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5343-1
https://xenbits.xen.org/xsa/advisory-371.html
https://xenbits.xenproject.org/xsa/advisory-371.txt
linux-libc-dev CVE-2021-28711 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
linux-libc-dev CVE-2021-28712 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
linux-libc-dev CVE-2021-28713 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
linux-libc-dev CVE-2021-28714 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-28714
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
linux-libc-dev CVE-2021-28715 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-28715
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
linux-libc-dev CVE-2021-28950 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-28950
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://git.kernel.org/linus/775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://linux.oracle.com/cve/CVE-2021-28950.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://nvd.nist.gov/vuln/detail/CVE-2021-28950
https://ubuntu.com/security/notices/USN-4911-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-28964 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-28964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964
https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://linux.oracle.com/cve/CVE-2021-28964.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28964
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
linux-libc-dev CVE-2021-28971 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-28971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28971
https://git.kernel.org/linus/d88d05a9e0b6d9356e97129d4ff9942d765f46ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea
https://linux.oracle.com/cve/CVE-2021-28971.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28971
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
linux-libc-dev CVE-2021-28972 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-28972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972
https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28972
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-29264 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-29264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2021-29264
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4949-1
https://ubuntu.com/security/notices/USN-4982-1
linux-libc-dev CVE-2021-29265 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-29265
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9380afd6df70e24eacbdbde33afc6a3950965d22
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-29265
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4949-1
linux-libc-dev CVE-2021-29647 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-29647
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/
https://nvd.nist.gov/vuln/detail/CVE-2021-29647
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
linux-libc-dev CVE-2021-29650 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-29650
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1
https://linux.oracle.com/cve/CVE-2021-29650.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/
https://nvd.nist.gov/vuln/detail/CVE-2021-29650
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4947-1
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4949-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-30002 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-30002
https://bugzilla.suse.com/show_bug.cgi?id=1184120
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-30002
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4947-1
https://ubuntu.com/security/notices/USN-4984-1
linux-libc-dev CVE-2021-3178 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/
https://nvd.nist.gov/vuln/detail/CVE-2021-3178
https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4910-1
https://ubuntu.com/security/notices/USN-4912-1
linux-libc-dev CVE-2021-31916 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-31916
https://bugzilla.redhat.com/show_bug.cgi?id=1946965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916
https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://linux.oracle.com/cve/CVE-2021-31916.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31916
https://seclists.org/oss-sec/2021/q1/268
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.openwall.com/lists/oss-security/2021/03/28/1
linux-libc-dev CVE-2021-33061 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-33061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061
https://security.netapp.com/advisory/ntap-20220210-0010/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
linux-libc-dev CVE-2021-33098 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-33098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098
https://security.netapp.com/advisory/ntap-20211210-0005/
https://ubuntu.com/security/notices/USN-5343-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
linux-libc-dev CVE-2021-33624 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/06/21/1
https://access.redhat.com/security/cve/CVE-2021-33624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e
https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33624
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5115-1
https://www.openwall.com/lists/oss-security/2021/06/21/1
https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
linux-libc-dev CVE-2021-3428 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3428
https://bugzilla.redhat.com/show_bug.cgi?id=1972621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428
https://linux.oracle.com/cve/CVE-2021-3428.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://ubuntu.com/security/CVE-2021-3428
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/03/17/1
https://www.openwall.com/lists/oss-security/2021/03/17/13
https://www.openwall.com/lists/oss-security/2021/03/17/5
linux-libc-dev CVE-2021-34556 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2021/08/01/3
https://access.redhat.com/security/cve/CVE-2021-34556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-34556
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
linux-libc-dev CVE-2021-34693 MEDIUM 4.9.246-2 4.9.272-2
Expand...http://www.openwall.com/lists/oss-security/2021/06/15/1
https://access.redhat.com/security/cve/CVE-2021-34693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
https://linux.oracle.com/cve/CVE-2021-34693.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-34693
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/06/15/1
linux-libc-dev CVE-2021-35477 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-35477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-35477
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
linux-libc-dev CVE-2021-3564 MEDIUM 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/25/1
http://www.openwall.com/lists/oss-security/2021/06/01/2
https://access.redhat.com/security/cve/CVE-2021-3564
https://bugzilla.redhat.com/show_bug.cgi?id=1964139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564
https://linux.oracle.com/cve/CVE-2021-3564.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-3564
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/05/25/1
linux-libc-dev CVE-2021-3573 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3573
https://bugzilla.redhat.com/show_bug.cgi?id=1966578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52
https://linux.oracle.com/cve/CVE-2021-3573.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3573
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/06/08/2
linux-libc-dev CVE-2021-3659 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659
https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
https://linux.oracle.com/cve/CVE-2021-3659.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
linux-libc-dev CVE-2021-3669 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
linux-libc-dev CVE-2021-3679 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3679
https://bugzilla.redhat.com/show_bug.cgi?id=1989165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679
https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a
https://linux.oracle.com/cve/CVE-2021-3679.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/
https://nvd.nist.gov/vuln/detail/CVE-2021-3679
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
linux-libc-dev CVE-2021-3714 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3714
https://arxiv.org/abs/2111.08553
https://arxiv.org/pdf/2111.08553.pdf
linux-libc-dev CVE-2021-37159 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-37159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-37159.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-37159
https://security.netapp.com/advisory/ntap-20210819-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.spinics.net/lists/linux-usb/msg202228.html
linux-libc-dev CVE-2021-3732 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3732
https://bugzilla.redhat.com/show_bug.cgi?id=1995249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732
https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631
https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631
https://linux.oracle.com/cve/CVE-2021-3732.html
https://linux.oracle.com/errata/ELSA-2021-9577.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3732
https://ubuntu.com/security/CVE-2021-3732
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
linux-libc-dev CVE-2021-3753 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3753
https://bugzilla.redhat.com/show_bug.cgi?id=1999589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
https://linux.oracle.com/cve/CVE-2021-3753.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3753
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/09/01/4
linux-libc-dev CVE-2021-3759 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-3759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3759.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
linux-libc-dev CVE-2021-3772 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-38198 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-38198
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198
https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7
https://linux.oracle.com/cve/CVE-2021-38198.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38198
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-38199 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-38199
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c
https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38199
https://security.netapp.com/advisory/ntap-20210902-0010/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://www.debian.org/security/2021/dsa-4978
linux-libc-dev CVE-2021-38204 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-38204
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b
https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38204
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-38208 MEDIUM 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/08/17/1
http://www.openwall.com/lists/oss-security/2021/08/17/2
http://www.openwall.com/lists/oss-security/2021/08/24/2
https://access.redhat.com/security/cve/CVE-2021-38208
https://bugzilla.redhat.com/show_bug.cgi?id=1992810
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208
https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba
https://nvd.nist.gov/vuln/detail/CVE-2021-38208
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-39633 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633
https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14)
https://source.android.com/security/bulletin/2022-01-01
linux-libc-dev CVE-2021-39636 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-39636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636
https://source.android.com/security/bulletin/pixel/2021-12-01
https://ubuntu.com/security/notices/USN-5361-1
linux-libc-dev CVE-2021-39648 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://access.redhat.com/security/cve/CVE-2021-39648
https://android.googlesource.com/kernel/common/+/64e6bbfff52db4bf6785fab9cffab850b2de6870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39648
https://git.kernel.org/linus/64e6bbfff52db4bf6785fab9cffab850b2de6870
https://source.android.com/security/bulletin/pixel/2021-12-01
https://ubuntu.com/security/notices/USN-5343-1
linux-libc-dev CVE-2021-39656 MEDIUM 4.9.246-2 4.9.272-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39656
https://git.kernel.org/linus/14fbbc8297728e880070f7b077b3301a8c698ef9 (5.12-rc3)
https://source.android.com/security/bulletin/pixel/2021-12-01
linux-libc-dev CVE-2021-39657 MEDIUM 4.9.246-2 4.9.258-1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39657
https://git.kernel.org/linus/35fc4cd34426c242ab015ef280853b7bff101f48 (5.11-rc4)
https://lore.kernel.org/all/1609157080-26283-1-git-send-email-cang@codeaurora.org/
https://source.android.com/security/bulletin/pixel/2021-12-01
linux-libc-dev CVE-2021-4002 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-4002
https://bugzilla.redhat.com/show_bug.cgi?id=2025726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://linux.oracle.com/cve/CVE-2021-4002.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4002
https://ubuntu.com/security/notices/USN-5206-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5211-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/11/25/1
linux-libc-dev CVE-2021-4037 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-4037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
https://linux.oracle.com/cve/CVE-2021-4037.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
linux-libc-dev CVE-2021-4149 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-4149
https://bugzilla.redhat.com/show_bug.cgi?id=2026485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://linux.oracle.com/cve/CVE-2021-4149.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
https://nvd.nist.gov/vuln/detail/CVE-2021-4149
linux-libc-dev CVE-2021-4155 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json
https://access.redhat.com/security/cve/CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
https://linux.oracle.com/cve/CVE-2021-4155.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/10/1
linux-libc-dev CVE-2021-4159 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
linux-libc-dev CVE-2021-4203 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-4203
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
https://bugzilla.redhat.com/show_bug.cgi?id=2036934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
https://linux.oracle.com/cve/CVE-2021-4203.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4203
linux-libc-dev CVE-2021-42739 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-42739
https://bugzilla.redhat.com/show_bug.cgi?id=1951739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://linux.oracle.com/cve/CVE-2021-42739.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://nvd.nist.gov/vuln/detail/CVE-2021-42739
https://seclists.org/oss-sec/2021/q2/46
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5266-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://ubuntu.com/security/notices/USN-5361-1
linux-libc-dev CVE-2021-43389 MEDIUM 4.9.246-2 4.9.290-1
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://access.redhat.com/security/cve/CVE-2021-43389
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://linux.oracle.com/cve/CVE-2021-43389.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-43389
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/10/19/1
linux-libc-dev CVE-2021-43975 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-43975
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-43976 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://linux.oracle.com/cve/CVE-2021-43976.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://nvd.nist.gov/vuln/detail/CVE-2021-43976
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5361-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-44879 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-44879
https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-44879
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
linux-libc-dev CVE-2021-45095 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-45095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://linux.oracle.com/cve/CVE-2021-45095.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-45095
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2021-45868 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2021-45868
https://bugzilla.kernel.org/show_bug.cgi?id=214655
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868
https://git.kernel.org/linus/9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://linux.oracle.com/cve/CVE-2021-45868.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45868
https://security.netapp.com/advisory/ntap-20220419-0003/
https://www.openwall.com/lists/oss-security/2022/03/17/1
https://www.openwall.com/lists/oss-security/2022/03/17/2
linux-libc-dev CVE-2022-0001 MEDIUM 4.9.246-2 4.9.303-1
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://access.redhat.com/security/cve/CVE-2022-0001
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://linux.oracle.com/cve/CVE-2022-0001.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://ubuntu.com/security/notices/USN-5362-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
linux-libc-dev CVE-2022-0002 MEDIUM 4.9.246-2 4.9.303-1
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://access.redhat.com/security/cve/CVE-2022-0002
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://linux.oracle.com/cve/CVE-2022-0002.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
linux-libc-dev CVE-2022-0171 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-0171
linux-libc-dev CVE-2022-0480 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
linux-libc-dev CVE-2022-0487 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2022-0487
https://bugzilla.redhat.com/show_bug.cgi?id=2044561
https://bugzilla.suse.com/show_bug.cgi?id=1194516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0487
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2022-0494 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
linux-libc-dev CVE-2022-0617 MEDIUM 4.9.246-2 4.9.303-1
Expand...http://www.openwall.com/lists/oss-security/2022/04/13/2
https://access.redhat.com/security/cve/CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
https://linux.oracle.com/cve/CVE-2022-0617.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-0617
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2022-0644 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2022-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0644
https://git.kernel.org/linus/032146cda85566abcd1c4884d9d23e4e30a07e9a (5.15-rc7)
https://lkml.org/lkml/2021/10/6/254
https://lore.kernel.org/all/20211007220110.600005-1-willy@infradead.org/
linux-libc-dev CVE-2022-0812 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-0812
https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://twitter.com/iMilnb/status/1497125078252806161
linux-libc-dev CVE-2022-0850 MEDIUM 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2022-0850
https://bugzilla.redhat.com/show_bug.cgi?id=2060606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
linux-libc-dev CVE-2022-0854 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
linux-libc-dev CVE-2022-1016 MEDIUM 4.9.246-2
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/security/cve/CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://linux.oracle.com/cve/CVE-2022-1016.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://ubuntu.com/security/notices/USN-5415-1
https://www.openwall.com/lists/oss-security/2022/03/28/5
linux-libc-dev CVE-2022-1184 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1184
linux-libc-dev CVE-2022-1195 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://www.debian.org/security/2022/dsa-5127
linux-libc-dev CVE-2022-1198 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://github.com/torvalds/linux/commit/efe4186e6a1b54bf38b9e05450d43b0da1fd7739
https://marc.info/?i=c012878.3292f.17fe9417790.Coremail.duoming@zju.edu.cn
linux-libc-dev CVE-2022-1199 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
https://marc.info/?l=oss-security&m=164888973827435
linux-libc-dev CVE-2022-1204 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://github.com/torvalds/linux/commit/5352a761308397a0e6250fdc629bb3f615b94747
https://github.com/torvalds/linux/commit/87563a043cef044fed5db7967a75741cc16ad2b1
https://github.com/torvalds/linux/commit/9fd75b66b8f68498454d685dc4ba13192ae069b0
https://github.com/torvalds/linux/commit/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b
https://github.com/torvalds/linux/commit/feef318c855a361a1eccd880f33e88c460eb63b4
https://marc.info/?i=20c5f3a.325bc.17fe90c96f4.Coremail.duoming@zju.edu.cn
linux-libc-dev CVE-2022-1205 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
https://github.com/torvalds/linux/commit/fc6d01ff9ef03b66d4a3a23b46fc3c3d8cf92009
https://marc.info/?i=56c38247.32aa9.17fe95728b3.Coremail.duoming@zju.edu.cn
linux-libc-dev CVE-2022-1280 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1280
https://bugzilla.redhat.com/show_bug.cgi?id=2071022
https://www.openwall.com/lists/oss-security/2022/04/12/3
linux-libc-dev CVE-2022-1419 MEDIUM 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
https://www.openwall.com/lists/oss-security/2022/04/21/1
linux-libc-dev CVE-2022-1652 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1652
linux-libc-dev CVE-2022-1836 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1836
linux-libc-dev CVE-2022-23960 MEDIUM 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://access.redhat.com/security/cve/CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://developer.arm.com/documentation/ka004995/latest/
https://developer.arm.com/support/arm-security-updates
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
https://linux.oracle.com/cve/CVE-2022-23960.html
https://linux.oracle.com/errata/ELSA-2022-9274.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5362-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.vusec.net/projects/bhi-spectre-bhb/
linux-libc-dev CVE-2022-25258 MEDIUM 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2022-25258
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://github.com/szymonh/d-os-descriptor
https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://nvd.nist.gov/vuln/detail/CVE-2022-25258
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2022-25375 MEDIUM 4.9.246-2 4.9.303-1
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1
https://access.redhat.com/security/cve/CVE-2022-25375
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)
https://github.com/szymonh/rndis-co
https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25375
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2022-26966 MEDIUM 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-26966
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966
https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
https://linux.oracle.com/cve/CVE-2022-26966.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://nvd.nist.gov/vuln/detail/CVE-2022-26966
https://security.netapp.com/advisory/ntap-20220419-0001/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
linux-libc-dev CVE-2004-0230 LOW 4.9.246-2
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
linux-libc-dev CVE-2005-3660 LOW 4.9.246-2
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
linux-libc-dev CVE-2007-3719 LOW 4.9.246-2
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
https://access.redhat.com/security/cve/CVE-2007-3719
linux-libc-dev CVE-2008-2544 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2008-2544
https://bugzilla.redhat.com/show_bug.cgi?id=213135
linux-libc-dev CVE-2008-4609 LOW 4.9.246-2
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://access.redhat.com/security/cve/CVE-2008-4609
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://nvd.nist.gov/vuln/detail/CVE-2008-4609
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
linux-libc-dev CVE-2010-4563 LOW 4.9.246-2
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
https://access.redhat.com/security/cve/CVE-2010-4563
https://nvd.nist.gov/vuln/detail/CVE-2010-4563
linux-libc-dev CVE-2010-5321 LOW 4.9.246-2
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://access.redhat.com/security/cve/CVE-2010-5321
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
linux-libc-dev CVE-2011-4915 LOW 4.9.246-2
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
linux-libc-dev CVE-2011-4917 LOW 4.9.246-2
Expand...https://lkml.org/lkml/2011/11/7/340
https://www.openwall.com/lists/oss-security/2011/12/28/4
linux-libc-dev CVE-2012-4542 LOW 4.9.246-2
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://access.redhat.com/security/cve/CVE-2012-4542
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
linux-libc-dev CVE-2014-9892 LOW 4.9.246-2
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
linux-libc-dev CVE-2014-9900 LOW 4.9.246-2
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://access.redhat.com/security/cve/CVE-2014-9900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
linux-libc-dev CVE-2015-2877 LOW 4.9.246-2
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://access.redhat.com/security/cve/CVE-2015-2877
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
linux-libc-dev CVE-2016-10723 LOW 4.9.246-2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
linux-libc-dev CVE-2016-8660 LOW 4.9.246-2
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://access.redhat.com/security/cve/CVE-2016-8660
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
linux-libc-dev CVE-2017-0630 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/98213
https://access.redhat.com/security/cve/CVE-2017-0630
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
linux-libc-dev CVE-2017-11472 LOW 4.9.246-2
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3b2d69114fefa474fca542e51119036dceb4aa6f
https://access.redhat.com/security/cve/CVE-2017-11472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11472
https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6
https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
linux-libc-dev CVE-2017-12762 LOW 4.9.246-2
Expand...http://seclists.org/oss-sec/2017/q3/274
http://www.openwall.com/lists/oss-security/2020/02/11/1
http://www.openwall.com/lists/oss-security/2020/02/11/2
http://www.openwall.com/lists/oss-security/2020/02/14/4
http://www.securityfocus.com/bid/100251
https://access.redhat.com/security/cve/CVE-2017-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762
https://patchwork.kernel.org/patch/9880041/
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
linux-libc-dev CVE-2017-13693 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
linux-libc-dev CVE-2017-13694 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/100500
https://access.redhat.com/security/cve/CVE-2017-13694
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
linux-libc-dev CVE-2017-13695 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/100497
https://access.redhat.com/security/cve/CVE-2017-13695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695
https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5
https://linux.oracle.com/cve/CVE-2017-13695.html
https://linux.oracle.com/errata/ELSA-2018-4250.html
https://patchwork.kernel.org/patch/9850567/
https://ubuntu.com/security/notices/USN-3696-1
https://ubuntu.com/security/notices/USN-3696-2
https://ubuntu.com/security/notices/USN-3762-1
https://ubuntu.com/security/notices/USN-3762-2
https://usn.ubuntu.com/3696-1/
https://usn.ubuntu.com/3696-2/
https://usn.ubuntu.com/3762-1/
https://usn.ubuntu.com/3762-2/
linux-libc-dev CVE-2017-9986 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/99336
https://access.redhat.com/security/cve/CVE-2017-9986
https://bugzilla.kernel.org/show_bug.cgi?id=196135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9986
linux-libc-dev CVE-2018-1121 LOW 4.9.246-2
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
linux-libc-dev CVE-2018-12928 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/104593
https://access.redhat.com/security/cve/CVE-2018-12928
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
linux-libc-dev CVE-2018-17977 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
linux-libc-dev CVE-2018-20669 LOW 4.9.246-2
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/i915/i915_gem_execbuffer.c
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html
http://www.openwall.com/lists/oss-security/2019/01/23/6
http://www.securityfocus.com/bid/106748
https://access.redhat.com/security/cve/CVE-2018-20669
https://access.redhat.com/security/cve/cve-2018-20669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669
https://linux.oracle.com/cve/CVE-2018-20669.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://security.netapp.com/advisory/ntap-20190404-0002/
https://support.f5.com/csp/article/K32059550
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4485-1/
https://www.openwall.com/lists/oss-security/2019/01/23/6
https://www.openwall.com/lists/oss-security/2019/02/07/1
linux-libc-dev CVE-2018-8043 LOW 4.9.246-2
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
http://www.securitytracker.com/id/1040749
https://access.redhat.com/security/cve/CVE-2018-8043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043
https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
https://linux.oracle.com/cve/CVE-2018-8043.html
https://linux.oracle.com/errata/ELSA-2019-4509.html
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3630-1
https://ubuntu.com/security/notices/USN-3630-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3630-1/
https://usn.ubuntu.com/3630-2/
https://usn.ubuntu.com/3632-1/
linux-libc-dev CVE-2019-11191 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://access.redhat.com/security/cve/CVE-2019-11191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
linux-libc-dev CVE-2019-12378 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/108475
https://access.redhat.com/security/cve/CVE-2019-12378
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
linux-libc-dev CVE-2019-12379 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/108478
https://access.redhat.com/security/cve/CVE-2019-12379
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
linux-libc-dev CVE-2019-12380 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://access.redhat.com/security/cve/CVE-2019-12380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
linux-libc-dev CVE-2019-12381 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/108473
https://access.redhat.com/security/cve/CVE-2019-12381
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
linux-libc-dev CVE-2019-12382 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://access.redhat.com/security/cve/CVE-2019-12382
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
linux-libc-dev CVE-2019-12455 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-12455
https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
linux-libc-dev CVE-2019-12456 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2019-12456
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&utm_medium=RSS
linux-libc-dev CVE-2019-12615 LOW 4.9.246-2
Expand...http://www.securityfocus.com/bid/108549
https://access.redhat.com/security/cve/CVE-2019-12615
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K60924046
https://support.f5.com/csp/article/K60924046?utm_source=f5support&utm_medium=RSS
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html
linux-libc-dev CVE-2019-16229 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-16229
https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
linux-libc-dev CVE-2019-16230 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
linux-libc-dev CVE-2019-16231 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://access.redhat.com/security/cve/CVE-2019-16231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
linux-libc-dev CVE-2019-16232 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/security/cve/CVE-2019-16232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
linux-libc-dev CVE-2019-16233 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-16233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
linux-libc-dev CVE-2019-16234 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/security/cve/CVE-2019-16234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
linux-libc-dev CVE-2019-18808 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2021/09/14/1
https://access.redhat.com/security/cve/CVE-2019-18808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
https://linux.oracle.com/cve/CVE-2019-18808.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
linux-libc-dev CVE-2019-19046 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19046
https://bugzilla.suse.com/show_bug.cgi?id=1157304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
https://linux.oracle.com/cve/CVE-2019-19046.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4302-1
https://ubuntu.com/security/notices/USN-4319-1
https://ubuntu.com/security/notices/USN-4325-1
https://usn.ubuntu.com/4302-1/
https://usn.ubuntu.com/4319-1/
https://usn.ubuntu.com/4325-1/
linux-libc-dev CVE-2019-19054 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177
https://linux.oracle.com/cve/CVE-2019-19054.html
https://linux.oracle.com/errata/ELSA-2020-5878.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
linux-libc-dev CVE-2019-19060 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19060
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060
https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4364-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4364-1/
linux-libc-dev CVE-2019-19061 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19061
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061
https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4526-1/
linux-libc-dev CVE-2019-19064 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19064
https://bugzilla.suse.com/show_bug.cgi?id=1157300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064
https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4300-1
https://usn.ubuntu.com/4300-1/
linux-libc-dev CVE-2019-19067 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19067
https://bugzilla.suse.com/show_bug.cgi?id=1157180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067
https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4526-1/
linux-libc-dev CVE-2019-19070 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2019-19070
https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
linux-libc-dev CVE-2019-19075 LOW 4.9.246-2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19075
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075
https://github.com/torvalds/linux/commit/6402939ec86eaf226c8b8ae00ed983936b164908
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4226-1/
linux-libc-dev CVE-2020-11725 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-11725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://nvd.nist.gov/vuln/detail/CVE-2020-11725
https://twitter.com/yabbadabbadrew/status/1248632267028582400
linux-libc-dev CVE-2020-24586 LOW 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24586.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
linux-libc-dev CVE-2020-24587 LOW 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24587.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
linux-libc-dev CVE-2020-24588 LOW 4.9.246-2 4.9.272-1
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24588
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24588.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
linux-libc-dev CVE-2020-27820 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-27820
https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2020-27820.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5415-1
linux-libc-dev CVE-2020-29374 LOW 4.9.246-2 4.9.272-1
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2020-29374
https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29374
https://security.netapp.com/advisory/ntap-20210115-0002/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://www.debian.org/security/2022/dsa-5096
linux-libc-dev CVE-2020-35501 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
linux-libc-dev CVE-2021-0929 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-0929
https://source.android.com/security/bulletin/2021-11-01
linux-libc-dev CVE-2021-21781 LOW 4.9.246-2 4.9.272-2
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-21781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21781
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/9c698bff66ab4914bb3d71da7dc6112519bde23e
https://linux.oracle.com/cve/CVE-2021-21781.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243
linux-libc-dev CVE-2021-32078 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2021-32078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://nvd.nist.gov/vuln/detail/CVE-2021-32078
https://security.netapp.com/advisory/ntap-20210813-0002/
linux-libc-dev CVE-2021-3655 LOW 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-3655
https://bugzilla.redhat.com/show_bug.cgi?id=1984024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f
https://linux.oracle.com/cve/CVE-2021-3655.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/
https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-3655
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
linux-libc-dev CVE-2021-38205 LOW 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-38205
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205
https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38205
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
linux-libc-dev CVE-2021-38209 LOW 4.9.246-2 4.9.272-1
Expand...https://access.redhat.com/security/cve/CVE-2021-38209
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38209
https://github.com/torvalds/linux/commit/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6
https://nvd.nist.gov/vuln/detail/CVE-2021-38209
linux-libc-dev CVE-2021-45486 LOW 4.9.246-2 4.9.290-1
Expand...https://access.redhat.com/security/cve/CVE-2021-45486
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba
https://linux.oracle.com/cve/CVE-2021-45486.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45486
https://ubuntu.com/security/notices/USN-5361-1
linux-libc-dev CVE-2022-1516 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7781607938c8
https://ubuntu.com/security/notices/USN-5416-1
linux-libc-dev CVE-2022-1734 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-1734
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
linux-libc-dev CVE-2022-24448 LOW 4.9.246-2 4.9.303-1
Expand...https://access.redhat.com/security/cve/CVE-2022-24448
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://linux.oracle.com/cve/CVE-2022-24448.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-24448
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.spinics.net/lists/stable/msg531976.html
linux-libc-dev CVE-2022-25265 LOW 4.9.246-2
Expand...https://access.redhat.com/security/cve/CVE-2022-25265
https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
https://nvd.nist.gov/vuln/detail/CVE-2022-25265
https://security.netapp.com/advisory/ntap-20220318-0005/
linux-libc-dev CVE-2022-1789 UNKNOWN 4.9.246-2
Expand...
login CVE-2017-12424 CRITICAL 1:4.4-4.1 1:4.4-4.1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2017-12424
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424
https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
https://security.gentoo.org/glsa/201710-16
https://ubuntu.com/security/notices/USN-5254-1
login CVE-2017-20002 HIGH 1:4.4-4.1 1:4.4-4.1+deb9u1
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
login CVE-2007-5686 LOW 1:4.4-4.1
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
login CVE-2013-4235 LOW 1:4.4-4.1
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
login CVE-2018-7169 LOW 1:4.4-4.1
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
login CVE-2019-19882 LOW 1:4.4-4.1
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
m4 CVE-2008-1687 LOW 1.4.18-1
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://access.redhat.com/security/cve/CVE-2008-1687
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
m4 CVE-2008-1688 LOW 1.4.18-1
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://access.redhat.com/security/cve/CVE-2008-1688
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
mercurial CVE-2018-17983 LOW 4.0-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-17983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17983
https://ubuntu.com/security/notices/USN-5102-1
https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901
https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.7.2_.282018-10-01.29
mercurial-common CVE-2018-17983 LOW 4.0-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-17983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17983
https://ubuntu.com/security/notices/USN-5102-1
https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901
https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.7.2_.282018-10-01.29
mount CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
mount CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
mount CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
multiarch-support CVE-2018-6485 CRITICAL 2.24-11+deb9u4
Expand...http://bugs.debian.org/878159
http://www.securityfocus.com/bid/102912
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2018-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
https://linux.oracle.com/cve/CVE-2018-6485.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22343
https://ubuntu.com/security/notices/USN-4218-1
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4218-1/
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
multiarch-support CVE-2018-6551 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-6551
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22
multiarch-support CVE-2019-9169 CRITICAL 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
multiarch-support CVE-2021-33574 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
multiarch-support CVE-2021-35942 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
multiarch-support CVE-2022-23218 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
multiarch-support CVE-2022-23219 CRITICAL 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
multiarch-support CVE-2009-5155 HIGH 2.24-11+deb9u4
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
multiarch-support CVE-2018-1000001 HIGH 2.24-11+deb9u4
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
multiarch-support CVE-2020-1751 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
multiarch-support CVE-2020-1752 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
multiarch-support CVE-2021-3326 HIGH 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
multiarch-support CVE-2021-3999 HIGH 2.24-11+deb9u4
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
multiarch-support CVE-2016-10739 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
multiarch-support CVE-2017-12132 MEDIUM 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/100598
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2017-12132
https://arxiv.org/pdf/1205.4011.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
https://linux.oracle.com/cve/CVE-2017-12132.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://sourceware.org/bugzilla/show_bug.cgi?id=21361
multiarch-support CVE-2019-25013 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
multiarch-support CVE-2020-10029 MEDIUM 2.24-11+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
multiarch-support CVE-2020-27618 MEDIUM 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
multiarch-support CVE-2010-4756 LOW 2.24-11+deb9u4
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
multiarch-support CVE-2015-8985 LOW 2.24-11+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
multiarch-support CVE-2016-10228 LOW 2.24-11+deb9u4
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
multiarch-support CVE-2018-20796 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
multiarch-support CVE-2019-1010022 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
multiarch-support CVE-2019-1010023 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
multiarch-support CVE-2019-1010024 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
multiarch-support CVE-2019-1010025 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
multiarch-support CVE-2019-19126 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
multiarch-support CVE-2019-6488 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106671
https://access.redhat.com/security/cve/CVE-2019-6488
https://nvd.nist.gov/vuln/detail/CVE-2019-6488
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24097
multiarch-support CVE-2019-7309 LOW 2.24-11+deb9u4
Expand...http://www.securityfocus.com/bid/106835
https://access.redhat.com/security/cve/CVE-2019-7309
https://nvd.nist.gov/vuln/detail/CVE-2019-7309
https://security.gentoo.org/glsa/202006-04
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
multiarch-support CVE-2019-9192 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
multiarch-support CVE-2020-6096 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
multiarch-support CVE-2021-27645 LOW 2.24-11+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
ncurses-base CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
ncurses-base CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
ncurses-base CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
ncurses-base CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
ncurses-base CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
ncurses-bin CVE-2022-29458 HIGH 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
ncurses-bin CVE-2018-19211 LOW 6.0+20161126-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
ncurses-bin CVE-2019-17594 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
ncurses-bin CVE-2019-17595 LOW 6.0+20161126-1+deb9u2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
ncurses-bin CVE-2021-39537 LOW 6.0+20161126-1+deb9u2
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
openssh-client CVE-2021-41617 HIGH 1:7.4p1-10+deb9u7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
openssh-client CVE-2007-2243 LOW 1:7.4p1-10+deb9u7
Expand...http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html
http://securityreason.com/securityalert/2631
http://www.osvdb.org/34600
http://www.securityfocus.com/bid/23601
https://exchange.xforce.ibmcloud.com/vulnerabilities/33794
https://security.netapp.com/advisory/ntap-20191107-0003/
openssh-client CVE-2007-2768 LOW 1:7.4p1-10+deb9u7
Expand...http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html
http://www.osvdb.org/34601
https://nvd.nist.gov/vuln/detail/CVE-2007-2768
https://security.netapp.com/advisory/ntap-20191107-0002/
openssh-client CVE-2008-3234 LOW 1:7.4p1-10+deb9u7
Expand...http://www.securityfocus.com/bid/30276
https://exchange.xforce.ibmcloud.com/vulnerabilities/44037
https://www.exploit-db.com/exploits/6094
openssh-client CVE-2016-20012 LOW 1:7.4p1-10+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
openssh-client CVE-2018-15919 LOW 1:7.4p1-10+deb9u7
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
openssh-client CVE-2019-6110 LOW 1:7.4p1-10+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
openssh-client CVE-2020-12062 LOW 1:7.4p1-10+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2020-12062
https://github.com/openssh/openssh-portable/commit/955854cafca88e0cdcd3d09ca1ad4ada465364a1
https://github.com/openssh/openssh-portable/commit/aad87b88fc2536b1ea023213729aaf4eaabe1894
https://www.openssh.com/txt/release-8.3
https://www.openwall.com/lists/oss-security/2020/05/27/1
openssh-client CVE-2020-14145 LOW 1:7.4p1-10+deb9u7
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
openssh-client CVE-2020-15778 LOW 1:7.4p1-10+deb9u7
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
openssh-client CVE-2021-36368 LOW 1:7.4p1-10+deb9u7
Expand...https://access.redhat.com/security/cve/CVE-2021-36368
https://bugzilla.mindrot.org/show_bug.cgi?id=3316
https://docs.ssh-mitm.at/trivialauth.html
https://github.com/openssh/openssh-portable/pull/258
https://nvd.nist.gov/vuln/detail/CVE-2021-36368
https://security-tracker.debian.org/tracker/CVE-2021-36368
https://www.openssh.com/security.html
openssl CVE-2022-1292 CRITICAL 1.1.0l-1~deb9u2 1.1.0l-1~deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
openssl CVE-2021-23840 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
openssl CVE-2021-3712 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
openssl CVE-2022-0778 HIGH 1.1.0l-1~deb9u2 1.1.0l-1~deb9u5
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
openssl CVE-2019-1551 MEDIUM 1.1.0l-1~deb9u2 1.1.0l-1~deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
openssl CVE-2021-23841 MEDIUM 1.1.0l-1~deb9u2 1.1.0l-1~deb9u3
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
openssl CVE-2021-4160 MEDIUM 1.1.0l-1~deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
openssl CVE-2007-6755 LOW 1.1.0l-1~deb9u2
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
openssl CVE-2010-0928 LOW 1.1.0l-1~deb9u2
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
passwd CVE-2017-12424 CRITICAL 1:4.4-4.1 1:4.4-4.1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2017-12424
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424
https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
https://security.gentoo.org/glsa/201710-16
https://ubuntu.com/security/notices/USN-5254-1
passwd CVE-2017-20002 HIGH 1:4.4-4.1 1:4.4-4.1+deb9u1
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html
passwd CVE-2007-5686 LOW 1:4.4-4.1
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
passwd CVE-2013-4235 LOW 1:4.4-4.1
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
passwd CVE-2018-7169 LOW 1:4.4-4.1
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
passwd CVE-2019-19882 LOW 1:4.4-4.1
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
patch CVE-2010-4651 LOW 2.7.5-1+deb9u2
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://access.redhat.com/security/cve/CVE-2010-4651
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
patch CVE-2016-10713 LOW 2.7.5-1+deb9u2
Expand...http://www.securityfocus.com/bid/103063
https://access.redhat.com/errata/RHSA-2019:2033
https://access.redhat.com/security/cve/CVE-2016-10713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713
https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
https://linux.oracle.com/cve/CVE-2016-10713.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?45990
https://ubuntu.com/security/notices/USN-3624-1
https://ubuntu.com/security/notices/USN-3624-2
https://usn.ubuntu.com/3624-1/
https://usn.ubuntu.com/3624-2/
patch CVE-2018-6951 LOW 2.7.5-1+deb9u2
Expand...http://www.securityfocus.com/bid/103044
https://access.redhat.com/security/cve/CVE-2018-6951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://nvd.nist.gov/vuln/detail/CVE-2018-6951
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
patch CVE-2018-6952 LOW 2.7.5-1+deb9u2
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://access.redhat.com/security/cve/CVE-2018-6952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6952
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
patch CVE-2021-45261 LOW 2.7.5-1+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-45261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
perl CVE-2020-16156 HIGH 5.24.1-3+deb9u7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl CVE-2011-4116 LOW 5.24.1-3+deb9u7
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
perl-base CVE-2020-16156 HIGH 5.24.1-3+deb9u7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-base CVE-2011-4116 LOW 5.24.1-3+deb9u7
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
perl-modules-5.24 CVE-2020-16156 HIGH 5.24.1-3+deb9u7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-modules-5.24 CVE-2011-4116 LOW 5.24.1-3+deb9u7
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
python CVE-2008-4108 LOW 2.7.13-2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://access.redhat.com/security/cve/CVE-2008-4108
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
python-minimal CVE-2008-4108 LOW 2.7.13-2
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://access.redhat.com/security/cve/CVE-2008-4108
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
python2.7 CVE-2015-20107 CRITICAL 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
python2.7 CVE-2021-3177 CRITICAL 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python2.7 CVE-2019-16935 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
python2.7 CVE-2021-23336 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python2.7 CVE-2021-4189 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
python2.7 CVE-2013-7040 LOW 2.7.13-2+deb9u4
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
python2.7 CVE-2017-17522 LOW 2.7.13-2+deb9u4
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
python2.7 CVE-2018-1000030 LOW 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
python2.7 CVE-2019-18348 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
python2.7 CVE-2019-9674 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
python2.7 CVE-2020-8492 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
python2.7-minimal CVE-2015-20107 CRITICAL 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
python2.7-minimal CVE-2021-3177 CRITICAL 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python2.7-minimal CVE-2019-16935 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
python2.7-minimal CVE-2021-23336 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u5
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python2.7-minimal CVE-2021-4189 MEDIUM 2.7.13-2+deb9u4 2.7.13-2+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
python2.7-minimal CVE-2013-7040 LOW 2.7.13-2+deb9u4
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
python2.7-minimal CVE-2017-17522 LOW 2.7.13-2+deb9u4
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
python2.7-minimal CVE-2018-1000030 LOW 2.7.13-2+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
python2.7-minimal CVE-2019-18348 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
python2.7-minimal CVE-2019-9674 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
python2.7-minimal CVE-2020-8492 LOW 2.7.13-2+deb9u4
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
python3.5 CVE-2015-20107 CRITICAL 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
python3.5 CVE-2021-3177 CRITICAL 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python3.5 CVE-2021-3737 HIGH 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
python3.5 CVE-2022-0391 HIGH 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
python3.5 CVE-2021-23336 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python3.5 CVE-2021-3426 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python3.5 CVE-2021-3733 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
python3.5 CVE-2021-4189 MEDIUM 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
python3.5 CVE-2017-17522 LOW 3.5.3-1+deb9u3
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
python3.5 CVE-2019-9674 LOW 3.5.3-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
python3.5-minimal CVE-2015-20107 CRITICAL 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
python3.5-minimal CVE-2021-3177 CRITICAL 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python3.5-minimal CVE-2021-3737 HIGH 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
python3.5-minimal CVE-2022-0391 HIGH 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
python3.5-minimal CVE-2021-23336 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python3.5-minimal CVE-2021-3426 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u4
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python3.5-minimal CVE-2021-3733 MEDIUM 3.5.3-1+deb9u3 3.5.3-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
python3.5-minimal CVE-2021-4189 MEDIUM 3.5.3-1+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
python3.5-minimal CVE-2017-17522 LOW 3.5.3-1+deb9u3
Expand...http://www.securityfocus.com/bid/102207
https://access.redhat.com/security/cve/CVE-2017-17522
https://bugs.python.org/issue32367
https://nvd.nist.gov/vuln/detail/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-17522
python3.5-minimal CVE-2019-9674 LOW 3.5.3-1+deb9u3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
subversion CVE-2020-17525 HIGH 1.9.5-1+deb9u5 1.9.5-1+deb9u6
Expand...https://access.redhat.com/security/cve/CVE-2020-17525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525
https://errata.almalinux.org/8/ALSA-2021-0507.html
https://linux.oracle.com/cve/CVE-2020-17525.html
https://linux.oracle.com/errata/ELSA-2021-0507.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17525
https://subversion.apache.org/security/CVE-2020-17525-advisory.txt
https://ubuntu.com/security/notices/USN-5322-1
https://ubuntu.com/security/notices/USN-5445-1
subversion CVE-2021-28544 MEDIUM 1.9.5-1+deb9u5
Expand...https://access.redhat.com/security/cve/CVE-2021-28544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28544
https://nvd.nist.gov/vuln/detail/CVE-2021-28544
https://subversion.apache.org/security/CVE-2021-28544-advisory.txt
https://ubuntu.com/security/notices/USN-5372-1
https://www.debian.org/security/2022/dsa-5119
tar CVE-2018-20482 MEDIUM 1.29b-1.1 1.29b-1.1+deb9u1
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://www.securityfocus.com/bid/106354
https://access.redhat.com/security/cve/CVE-2018-20482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482
https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html
https://news.ycombinator.com/item?id=18745431
https://security.gentoo.org/glsa/201903-05
https://twitter.com/thatcks/status/1076166645708668928
https://ubuntu.com/security/notices/USN-4692-1
https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
tar CVE-2005-2541 LOW 1.29b-1.1
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
tar CVE-2019-9923 LOW 1.29b-1.1
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
tar CVE-2021-20193 LOW 1.29b-1.1
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
tzdata DLA-2797-1 UNKNOWN 2021a-0+deb9u1 2021a-0+deb9u2
Expand...
tzdata DLA-2963-1 UNKNOWN 2021a-0+deb9u1 2021a-0+deb9u3
Expand...
unzip CVE-2022-0529 MEDIUM 6.0-21+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2022-0529
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0529
unzip CVE-2022-0530 MEDIUM 6.0-21+deb9u2
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-0530
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0530
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
unzip CVE-2021-4217 LOW 6.0-21+deb9u2
Expand...https://access.redhat.com/security/cve/CVE-2021-4217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
util-linux CVE-2016-2779 HIGH 2.29.2-1+deb9u1
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
util-linux CVE-2021-37600 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
util-linux CVE-2022-0563 LOW 2.29.2-1+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
wget CVE-2021-31879 MEDIUM 1.18-5+deb9u3
Expand...https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
xz-utils CVE-2022-1271 HIGH 5.2.2-1.2 5.2.2-1.2+deb9u1
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
zlib1g CVE-2018-25032 HIGH 1:1.2.8.dfsg-5 1:1.2.8.dfsg-5+deb9u1
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
zlib1g-dev CVE-2018-25032 HIGH 1:1.2.8.dfsg-5 1:1.2.8.dfsg-5+deb9u1
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

node-pkg

Package Vulnerability Severity Installed Version Fixed Version Links
ansi-regex CVE-2021-3807 HIGH 3.0.0 3.0.1, 4.1.1, 5.0.1, 6.0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
ansi-regex CVE-2021-3807 HIGH 4.1.0 3.0.1, 4.1.1, 5.0.1, 6.0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
ansi-regex CVE-2021-3807 HIGH 5.0.0 3.0.1, 4.1.1, 5.0.1, 6.0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
async CVE-2021-43138 HIGH 2.6.3 2.6.4, 3.2.2
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
hosted-git-info CVE-2021-23362 MEDIUM 2.8.8 2.8.9, 3.0.8
Expand...https://access.redhat.com/security/cve/CVE-2021-23362
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3074.html
https://github.com/advisories/GHSA-43f8-2h32-f4cj
https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
https://github.com/npm/hosted-git-info/commits/v2
https://github.com/npm/hosted-git-info/pull/76
https://linux.oracle.com/cve/CVE-2021-23362.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23362
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
json-schema CVE-2021-3918 MEDIUM 0.2.3 0.4.0
Expand...https://access.redhat.com/security/cve/CVE-2021-3918
https://github.com/advisories/GHSA-896r-f27r-55mw
https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a
https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa
https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
https://linux.oracle.com/cve/CVE-2021-3918.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3918
minimist CVE-2021-44906 CRITICAL 1.2.5 1.2.6
Expand...https://access.redhat.com/security/cve/CVE-2021-44906
https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
moment CVE-2022-24785 HIGH 2.29.1 2.29.2
Expand...https://access.redhat.com/security/cve/CVE-2022-24785
https://github.com/advisories/GHSA-8hfj-j24r-96c4
https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5
https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
https://nvd.nist.gov/vuln/detail/CVE-2022-24785
https://security.netapp.com/advisory/ntap-20220513-0006/
https://www.tenable.com/security/tns-2022-09
node-fetch CVE-2022-0235 HIGH 2.6.1 2.6.7, 3.1.1
Expand...https://access.redhat.com/security/cve/CVE-2022-0235
https://github.com/advisories/GHSA-r683-j2x4-v87g
https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10
https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60
https://github.com/node-fetch/node-fetch/pull/1453
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/
https://nvd.nist.gov/vuln/detail/CVE-2022-0235
path-parse CVE-2021-23343 MEDIUM 1.0.6 1.0.7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json
https://access.redhat.com/security/cve/CVE-2021-23343
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-hj48-42vr-x3v9
https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7
https://github.com/jbgutierrez/path-parse/issues/8
https://github.com/jbgutierrez/path-parse/pull/10
https://linux.oracle.com/cve/CVE-2021-23343.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23343
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
ssri CVE-2021-27290 HIGH 6.0.1 8.0.1, 7.1.1, 6.0.2
Expand...https://access.redhat.com/security/cve/CVE-2021-27290
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
https://errata.almalinux.org/8/ALSA-2021-3074.html
https://github.com/advisories/GHSA-vx3p-948g-6vhq
https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
https://github.com/npm/ssri/pull/20#issuecomment-842677644
https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
https://linux.oracle.com/cve/CVE-2021-27290.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://npmjs.com
https://nvd.nist.gov/vuln/detail/CVE-2021-27290
https://www.npmjs.com/package/ssri
https://www.oracle.com/security-alerts/cpuoct2021.html
strapi CVE-2022-27263 CRITICAL 3.6.8
Expand...https://github.com/advisories/GHSA-9qgm-w87q-hx89
https://github.com/strapi/strapi
https://nvd.nist.gov/vuln/detail/CVE-2022-27263
https://www.youtube.com/watch?v=LEeabouqRrg
strapi CVE-2021-46440 HIGH 3.6.8 3.6.9
Expand...http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html
https://github.com/advisories/GHSA-85vg-grr5-pw42
https://github.com/strapi/strapi/pull/12246
https://hub.docker.com/r/strapi/strapi
https://nvd.nist.gov/vuln/detail/CVE-2021-46440
https://strapi.io/
strapi CVE-2022-0764 MEDIUM 3.6.8 4.1.0
Expand...https://github.com/advisories/GHSA-xrjf-phvv-r4vr
https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13
https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c
https://github.com/strapi/strapi/issues/12879
https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5
https://nvd.nist.gov/vuln/detail/CVE-2022-0764
https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c
tar CVE-2021-32803 HIGH 4.4.13 6.1.2, 5.0.7, 4.4.15, 3.2.3
Expand...https://access.redhat.com/security/cve/CVE-2021-32803
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-r628-mhmh-qjhw
https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
https://linux.oracle.com/cve/CVE-2021-32803.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32803
https://www.npmjs.com/advisories/1771
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-32804 HIGH 4.4.13 6.1.1, 5.0.6, 4.4.14, 3.2.2
Expand...https://access.redhat.com/security/cve/CVE-2021-32804
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-3jfq-g458-7qm9
https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
https://linux.oracle.com/cve/CVE-2021-32804.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32804
https://www.npmjs.com/advisories/1770
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-37701 HIGH 4.4.13 6.1.7, 5.0.8, 4.4.16
Expand...https://access.redhat.com/security/cve/CVE-2021-37701
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-9r2w-394v-53qc
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
https://linux.oracle.com/cve/CVE-2021-37701.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37701
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1779
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-37712 HIGH 4.4.13 6.1.9, 5.0.10, 4.4.18
Expand...https://access.redhat.com/security/cve/CVE-2021-37712
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-qq89-hq3f-393p
https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
https://linux.oracle.com/cve/CVE-2021-37712.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37712
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1780
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-37713 HIGH 4.4.13 6.1.9, 5.0.10, 4.4.18
Expand...https://access.redhat.com/security/cve/CVE-2021-37713
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-5955-9wpr-37jh
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-37701 HIGH 6.1.4 6.1.7, 5.0.8, 4.4.16
Expand...https://access.redhat.com/security/cve/CVE-2021-37701
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-9r2w-394v-53qc
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
https://linux.oracle.com/cve/CVE-2021-37701.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37701
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1779
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-37712 HIGH 6.1.4 6.1.9, 5.0.10, 4.4.18
Expand...https://access.redhat.com/security/cve/CVE-2021-37712
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-qq89-hq3f-393p
https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
https://linux.oracle.com/cve/CVE-2021-37712.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37712
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1780
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
tar CVE-2021-37713 HIGH 6.1.4 6.1.9, 5.0.10, 4.4.18
Expand...https://access.redhat.com/security/cve/CVE-2021-37713
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-5955-9wpr-37jh
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
urijs CVE-2022-1243 HIGH 1.19.7 1.19.11
Expand...https://github.com/advisories/GHSA-3vjf-82ff-p4r3
https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae
https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7
https://nvd.nist.gov/vuln/detail/CVE-2022-1243
urijs CVE-2022-0613 MEDIUM 1.19.7 1.19.8
Expand...https://access.redhat.com/security/cve/CVE-2022-0613
https://github.com/advisories/GHSA-gcv8-gh4r-25x6
https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f
https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/
https://nvd.nist.gov/vuln/detail/CVE-2022-0613
urijs CVE-2022-0868 MEDIUM 1.19.7 1.19.10
Expand...https://github.com/advisories/GHSA-8h2f-7jc4-7m3m
https://github.com/medialize/URI.js/releases/tag/v1.19.10
https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509
https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02
https://nvd.nist.gov/vuln/detail/CVE-2022-0868
urijs CVE-2022-1233 MEDIUM 1.19.7 1.19.11
Expand...https://github.com/advisories/GHSA-g694-m8vq-gv9h
https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277
https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c
https://nvd.nist.gov/vuln/detail/CVE-2022-1233
urijs CVE-2022-24723 MEDIUM 1.19.7 1.19.9
Expand...https://access.redhat.com/security/cve/CVE-2022-24723
https://github.com/advisories/GHSA-gmv4-r438-p67f
https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316
https://github.com/medialize/URI.js/releases/tag/v1.19.9
https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f
https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316
https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/
https://nvd.nist.gov/vuln/detail/CVE-2022-24723
y18n CVE-2020-7774 HIGH 4.0.0 5.0.5, 4.0.1, 3.2.2
Expand...https://access.redhat.com/security/cve/CVE-2020-7774
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-0551.html
https://github.com/advisories/GHSA-c4w7-xm78-47vh
https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25
https://github.com/yargs/y18n/issues/96
https://github.com/yargs/y18n/pull/108
https://linux.oracle.com/cve/CVE-2020-7774.html
https://linux.oracle.com/errata/ELSA-2021-0551.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7774
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306
https://snyk.io/vuln/SNYK-JS-Y18N-1021887
https://www.oracle.com/security-alerts/cpuApr2021.html