bash |
CVE-2019-18276 |
LOW |
4.4.18-2ubuntu1.2 |
4.4.18-2ubuntu1.3 |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://access.redhat.com/security/cve/CVE-2019-18276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-18276 https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://ubuntu.com/security/notices/USN-5380-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.youtube.com/watch?v=-wGtxJ8opa8
|
coreutils |
CVE-2016-2781 |
LOW |
8.28-1ubuntu1 |
|
Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2781
|
cpp-7 |
CVE-2020-13844 |
MEDIUM |
7.5.0-3ubuntu1~18.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
curl |
CVE-2022-22576 |
MEDIUM |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576 https://curl.se/docs/CVE-2022-22576.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576 https://hackerone.com/reports/1526328 https://nvd.nist.gov/vuln/detail/CVE-2022-22576 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
curl |
CVE-2022-27774 |
MEDIUM |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774 https://curl.se/docs/CVE-2022-27774.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://hackerone.com/reports/1543773 https://nvd.nist.gov/vuln/detail/CVE-2022-27774 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
curl |
CVE-2022-27782 |
MEDIUM |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
curl |
CVE-2022-27776 |
LOW |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776 https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 https://hackerone.com/reports/1547048 https://nvd.nist.gov/vuln/detail/CVE-2022-27776 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
curl |
CVE-2022-27781 |
LOW |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
dbus |
CVE-2020-35512 |
LOW |
1.12.2-1ubuntu1.2 |
1.12.2-1ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
dbus-x11 |
CVE-2020-35512 |
LOW |
1.12.2-1ubuntu1.2 |
1.12.2-1ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
dirmngr |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
dpkg |
CVE-2022-1664 |
MEDIUM |
1.19.0.5ubuntu2.3 |
1.19.0.5ubuntu2.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html https://lists.debian.org/debian-security-announce/2022/msg00115.html https://nvd.nist.gov/vuln/detail/CVE-2022-1664 https://ubuntu.com/security/notices/USN-5446-1 https://ubuntu.com/security/notices/USN-5446-2
|
e2fsprogs |
CVE-2022-1304 |
MEDIUM |
1.44.1-1ubuntu1.3 |
1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
gcc-7-base |
CVE-2020-13844 |
MEDIUM |
7.5.0-3ubuntu1~18.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-8-base |
CVE-2020-13844 |
MEDIUM |
8.4.0-1ubuntu1~18.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gnupg |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gnupg-l10n |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gnupg-utils |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gnupg2 |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpg |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpg-agent |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpg-wks-client |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpg-wks-server |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpgconf |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpgsm |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
gpgv |
CVE-2019-13050 |
LOW |
2.2.4-1ubuntu1.4 |
2.2.4-1ubuntu1.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
groff-base |
CVE-2009-5080 |
LOW |
1.22.3-10 |
|
Expand...http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1;r2=1.2;f=h http://openwall.com/lists/oss-security/2009/08/14/4 http://openwall.com/lists/oss-security/2009/08/14/5 http://www.mandriva.com/security/advisories?name=MDVSA-2013:085 http://www.mandriva.com/security/advisories?name=MDVSA-2013:086 https://access.redhat.com/security/cve/CVE-2009-5080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5080
|
gzip |
CVE-2022-1271 |
MEDIUM |
1.6-5ubuntu1.1 |
1.6-5ubuntu1.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 https://errata.almalinux.org/8/ALSA-2022-1537.html https://linux.oracle.com/cve/CVE-2022-1271.html https://linux.oracle.com/errata/ELSA-2022-5052.html https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html https://ubuntu.com/security/notices/USN-5378-1 https://ubuntu.com/security/notices/USN-5378-2 https://ubuntu.com/security/notices/USN-5378-3 https://ubuntu.com/security/notices/USN-5378-4 https://www.openwall.com/lists/oss-security/2022/04/07/8
|
krb5-locales |
CVE-2018-20217 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763 https://access.redhat.com/security/cve/CVE-2018-20217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217 https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086 https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/ https://security.netapp.com/advisory/ntap-20190416-0006/
|
krb5-locales |
CVE-2021-36222 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
krb5-locales |
CVE-2021-37750 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libapparmor1 |
CVE-2016-1585 |
MEDIUM |
2.12-4ubuntu5.1 |
|
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2016-1585
|
libasn1-8-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libasn1-8-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libavahi-client3 |
CVE-2021-26720 |
LOW |
0.7-3.1ubuntu1.3 |
|
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796 https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824 https://bugzilla.suse.com/show_bug.cgi?id=1180827 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720 https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog https://nvd.nist.gov/vuln/detail/CVE-2021-26720 https://packages.debian.org/bullseye/avahi-daemon https://packages.debian.org/buster/avahi-daemon https://packages.debian.org/sid/avahi-daemon https://security-tracker.debian.org/tracker/CVE-2021-26720 https://www.openwall.com/lists/oss-security/2021/02/15/2
|
libavahi-common-data |
CVE-2021-26720 |
LOW |
0.7-3.1ubuntu1.3 |
|
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796 https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824 https://bugzilla.suse.com/show_bug.cgi?id=1180827 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720 https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog https://nvd.nist.gov/vuln/detail/CVE-2021-26720 https://packages.debian.org/bullseye/avahi-daemon https://packages.debian.org/buster/avahi-daemon https://packages.debian.org/sid/avahi-daemon https://security-tracker.debian.org/tracker/CVE-2021-26720 https://www.openwall.com/lists/oss-security/2021/02/15/2
|
libavahi-common3 |
CVE-2021-26720 |
LOW |
0.7-3.1ubuntu1.3 |
|
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796 https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824 https://bugzilla.suse.com/show_bug.cgi?id=1180827 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720 https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog https://nvd.nist.gov/vuln/detail/CVE-2021-26720 https://packages.debian.org/bullseye/avahi-daemon https://packages.debian.org/buster/avahi-daemon https://packages.debian.org/sid/avahi-daemon https://security-tracker.debian.org/tracker/CVE-2021-26720 https://www.openwall.com/lists/oss-security/2021/02/15/2
|
libc-bin |
CVE-2021-3999 |
MEDIUM |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc-bin |
CVE-2009-5155 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
libc-bin |
CVE-2015-8985 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
libc-bin |
CVE-2016-10228 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libc-bin |
CVE-2016-20013 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
libc-bin |
CVE-2019-25013 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libc-bin |
CVE-2020-27618 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin |
CVE-2020-29562 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2020-6096 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc-bin |
CVE-2021-3326 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libc-bin |
CVE-2021-35942 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc-bin |
CVE-2022-23218 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc-bin |
CVE-2022-23219 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 |
CVE-2021-3999 |
MEDIUM |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
libc6 |
CVE-2009-5155 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
libc6 |
CVE-2015-8985 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
libc6 |
CVE-2016-10228 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libc6 |
CVE-2016-20013 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
libc6 |
CVE-2019-25013 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libc6 |
CVE-2020-27618 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 |
CVE-2020-29562 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2020-6096 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
libc6 |
CVE-2021-3326 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
libc6 |
CVE-2021-35942 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
libc6 |
CVE-2022-23218 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libc6 |
CVE-2022-23219 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
libcairo-gobject2 |
CVE-2017-7475 |
LOW |
1.15.10-2ubuntu0.1 |
|
Expand...http://seclists.org/oss-sec/2017/q2/151 https://access.redhat.com/security/cve/CVE-2017-7475 https://bugs.freedesktop.org/show_bug.cgi?id=100763 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475 https://github.com/advisories/GHSA-5v3f-73gv-x7x5 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-7475
|
libcairo-gobject2 |
CVE-2018-18064 |
LOW |
1.15.10-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-18064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064 https://gitlab.freedesktop.org/cairo/cairo/issues/341 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libcairo-gobject2 |
CVE-2019-6461 |
LOW |
1.15.10-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/352 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6461
|
libcairo2 |
CVE-2017-7475 |
LOW |
1.15.10-2ubuntu0.1 |
|
Expand...http://seclists.org/oss-sec/2017/q2/151 https://access.redhat.com/security/cve/CVE-2017-7475 https://bugs.freedesktop.org/show_bug.cgi?id=100763 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475 https://github.com/advisories/GHSA-5v3f-73gv-x7x5 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-7475
|
libcairo2 |
CVE-2018-18064 |
LOW |
1.15.10-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-18064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064 https://gitlab.freedesktop.org/cairo/cairo/issues/341 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libcairo2 |
CVE-2019-6461 |
LOW |
1.15.10-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/352 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6461
|
libcom-err2 |
CVE-2022-1304 |
MEDIUM |
1.44.1-1ubuntu1.3 |
1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
libcroco3 |
CVE-2017-7960 |
LOW |
0.6.12-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html https://access.redhat.com/security/cve/CVE-2017-7960 https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960 https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 https://security.gentoo.org/glsa/201707-13 https://ubuntu.com/security/notices/USN-5389-1
|
libcroco3 |
CVE-2017-8834 |
LOW |
0.6.12-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html http://seclists.org/fulldisclosure/2017/Jun/10 http://www.openwall.com/lists/oss-security/2020/08/13/3 https://access.redhat.com/security/cve/CVE-2017-8834 https://bugzilla.gnome.org/show_bug.cgi?id=782647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834 https://ubuntu.com/security/notices/USN-5389-1 https://www.exploit-db.com/exploits/42147/
|
libcroco3 |
CVE-2017-8871 |
LOW |
0.6.12-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html http://seclists.org/fulldisclosure/2017/Jun/10 http://www.openwall.com/lists/oss-security/2020/08/13/3 https://access.redhat.com/security/cve/CVE-2017-8871 https://bugzilla.gnome.org/show_bug.cgi?id=782649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871 https://ubuntu.com/security/notices/USN-5389-1 https://www.exploit-db.com/exploits/42147/
|
libcroco3 |
CVE-2020-12825 |
LOW |
0.6.12-2 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/08/13/3 http://www.openwall.com/lists/oss-security/2020/09/08/3 https://access.redhat.com/security/cve/CVE-2020-12825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825 https://errata.almalinux.org/8/ALSA-2020-3654.html https://gitlab.gnome.org/GNOME/libcroco/-/issues/8 https://linux.oracle.com/cve/CVE-2020-12825.html https://linux.oracle.com/errata/ELSA-2020-4072.html https://ubuntu.com/security/notices/USN-5389-1
|
libcups2 |
CVE-2022-26691 |
MEDIUM |
2.2.7-1ubuntu2.8 |
2.2.7-1ubuntu2.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691 https://github.com/OpenPrinting/cups/commit/de4f8c196106033e4c372dce3e91b9d42b0b9444 https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0026/MNDT-2022-0026.md https://linux.oracle.com/cve/CVE-2022-26691.html https://linux.oracle.com/errata/ELSA-2022-5056.html https://lists.debian.org/debian-lts-announce/2022/05/msg00039.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQ6TD7F3VRITPEHFDHZHK7MU6FEBMZ5U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQRIT4H75XV6M42K7ZTARWZ7YLLYQHPO/ https://openprinting.github.io/cups-2.4.2 https://support.apple.com/en-in/HT213183 https://support.apple.com/en-us/HT213183 https://support.apple.com/en-us/HT213184 https://support.apple.com/en-us/HT213185 https://ubuntu.com/security/notices/USN-5454-1 https://ubuntu.com/security/notices/USN-5454-2 https://www.debian.org/security/2022/dsa-5149
|
libcups2 |
CVE-2019-8842 |
LOW |
2.2.7-1ubuntu2.8 |
2.2.7-1ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT210788 https://ubuntu.com/security/notices/USN-5454-1 https://ubuntu.com/security/notices/USN-5454-2
|
libcups2 |
CVE-2020-10001 |
LOW |
2.2.7-1ubuntu2.8 |
2.2.7-1ubuntu2.9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-10001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001 https://linux.oracle.com/cve/CVE-2020-10001.html https://linux.oracle.com/errata/ELSA-2021-4393.html https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html https://support.apple.com/en-us/HT212011 https://ubuntu.com/security/notices/USN-5454-1 https://ubuntu.com/security/notices/USN-5454-2
|
libcurl4 |
CVE-2022-22576 |
MEDIUM |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576 https://curl.se/docs/CVE-2022-22576.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576 https://hackerone.com/reports/1526328 https://nvd.nist.gov/vuln/detail/CVE-2022-22576 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
libcurl4 |
CVE-2022-27774 |
MEDIUM |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774 https://curl.se/docs/CVE-2022-27774.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://hackerone.com/reports/1543773 https://nvd.nist.gov/vuln/detail/CVE-2022-27774 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
libcurl4 |
CVE-2022-27782 |
MEDIUM |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
libcurl4 |
CVE-2022-27776 |
LOW |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776 https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 https://hackerone.com/reports/1547048 https://nvd.nist.gov/vuln/detail/CVE-2022-27776 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
libcurl4 |
CVE-2022-27781 |
LOW |
7.58.0-2ubuntu3.16 |
7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
libdbus-1-3 |
CVE-2020-35512 |
LOW |
1.12.2-1ubuntu1.2 |
1.12.2-1ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
libexpat1 |
CVE-2022-25235 |
HIGH |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25235 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235 https://github.com/libexpat/libexpat/pull/562 https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix) https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests) https://linux.oracle.com/cve/CVE-2022-25235.html https://linux.oracle.com/errata/ELSA-2022-9359.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25235 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libexpat1 |
CVE-2022-25236 |
HIGH |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25236 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236 https://github.com/libexpat/libexpat/pull/561 https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test) https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix) https://github.com/libexpat/libexpat/pull/577 https://linux.oracle.com/cve/CVE-2022-25236.html https://linux.oracle.com/errata/ELSA-2022-9359.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25236 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libexpat1 |
CVE-2021-46143 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2021-46143 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143 https://github.com/libexpat/libexpat/issues/532 https://github.com/libexpat/libexpat/pull/538 https://linux.oracle.com/cve/CVE-2021-46143.html https://linux.oracle.com/errata/ELSA-2022-9227.html https://nvd.nist.gov/vuln/detail/CVE-2021-46143 https://security.netapp.com/advisory/ntap-20220121-0006/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22822 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22822 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22822.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22822 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22823 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22823 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22823.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22823 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22824 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22824 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22824.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22824 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22825 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22825 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22825.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22825 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22826 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22826 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22826.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22826 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-22827 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22827 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22827.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22827 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-23852 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23852 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852 https://github.com/libexpat/libexpat/pull/550 https://linux.oracle.com/cve/CVE-2022-23852.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://nvd.nist.gov/vuln/detail/CVE-2022-23852 https://security.netapp.com/advisory/ntap-20220217-0001/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-23990 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23990 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990 https://github.com/libexpat/libexpat/pull/551 https://linux.oracle.com/cve/CVE-2022-23990.html https://linux.oracle.com/errata/ELSA-2022-9232.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/ https://nvd.nist.gov/vuln/detail/CVE-2022-23990 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-05
|
libexpat1 |
CVE-2022-25313 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.7 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25313 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313 https://github.com/libexpat/libexpat/pull/558 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25313 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libexpat1 |
CVE-2022-25314 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.7 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25314 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314 https://github.com/libexpat/libexpat/pull/560 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25314 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libexpat1 |
CVE-2022-25315 |
MEDIUM |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.7 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25315 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315 https://github.com/libexpat/libexpat/pull/559 https://linux.oracle.com/cve/CVE-2022-25315.html https://linux.oracle.com/errata/ELSA-2022-9359.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25315 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libexpat1 |
CVE-2021-45960 |
LOW |
2.2.5-3ubuntu0.2 |
2.2.5-3ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2021-45960 https://bugzilla.mozilla.org/show_bug.cgi?id=1217609 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960 https://github.com/libexpat/libexpat/issues/531 https://github.com/libexpat/libexpat/pull/534 https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea https://linux.oracle.com/cve/CVE-2021-45960.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2021-45960 https://security.netapp.com/advisory/ntap-20220121-0004/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
libext2fs2 |
CVE-2022-1304 |
MEDIUM |
1.44.1-1ubuntu1.3 |
1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
libflac8 |
CVE-2020-0499 |
LOW |
1.3.2-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-0499 https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/ https://source.android.com/security/bulletin/pixel/2020-12-01
|
libfreerdp-client2-2 |
CVE-2022-24882 |
MEDIUM |
2.2.0+dfsg1-0ubuntu0.18.04.2 |
2.2.0+dfsg1-0ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24882 https://github.com/FreeRDP/FreeRDP/pull/7750 https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/ https://ubuntu.com/security/notices/USN-5461-1
|
libfreerdp-client2-2 |
CVE-2022-24883 |
LOW |
2.2.0+dfsg1-0ubuntu0.18.04.2 |
2.2.0+dfsg1-0ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24883 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24883 https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144 https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/ https://ubuntu.com/security/notices/USN-5461-1
|
libfreerdp2-2 |
CVE-2022-24882 |
MEDIUM |
2.2.0+dfsg1-0ubuntu0.18.04.2 |
2.2.0+dfsg1-0ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24882 https://github.com/FreeRDP/FreeRDP/pull/7750 https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/ https://ubuntu.com/security/notices/USN-5461-1
|
libfreerdp2-2 |
CVE-2022-24883 |
LOW |
2.2.0+dfsg1-0ubuntu0.18.04.2 |
2.2.0+dfsg1-0ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24883 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24883 https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144 https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/ https://ubuntu.com/security/notices/USN-5461-1
|
libfreetype6 |
CVE-2022-27404 |
MEDIUM |
2.8.1-2ubuntu2.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-27404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404 https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27404
|
libfreetype6 |
CVE-2022-27405 |
LOW |
2.8.1-2ubuntu2.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405 https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27405
|
libfreetype6 |
CVE-2022-27406 |
LOW |
2.8.1-2ubuntu2.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406 https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27406 https://ubuntu.com/security/notices/USN-5453-1
|
libfuse2 |
CVE-2018-10906 |
LOW |
2.9.7-1ubuntu1 |
|
Expand...https://access.redhat.com/errata/RHSA-2018:3324 https://access.redhat.com/security/cve/CVE-2018-10906 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10906 https://github.com/libfuse/libfuse/pull/268 https://linux.oracle.com/cve/CVE-2018-10906.html https://linux.oracle.com/errata/ELSA-2020-5773.html https://lists.debian.org/debian-lts-announce/2018/08/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5XYA6PXT5PPWVK7CM7K4YRCYWA37DODB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A253TZWZK6R7PT2S5JIEAQJR2TYKX7V2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BREAIWIK64DRJWHIGR47L2D5YICY4HQ3/ https://nvd.nist.gov/vuln/detail/CVE-2018-10906 https://sourceforge.net/p/fuse/mailman/message/36374753/ https://ubuntu.com/security/notices/USN-5326-1 https://www.debian.org/security/2018/dsa-4257 https://www.exploit-db.com/exploits/45106/
|
libgcc1 |
CVE-2020-13844 |
MEDIUM |
8.4.0-1ubuntu1~18.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libgif7 |
CVE-2020-23922 |
LOW |
5.1.4-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-23922 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceforge.net/p/giflib/bugs/151/
|
libgif7 |
CVE-2021-40633 |
LOW |
5.1.4-2ubuntu0.1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40633 https://sourceforge.net/p/giflib/bugs/157/
|
libgif7 |
CVE-2022-28506 |
LOW |
5.1.4-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-28506 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28506 https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png https://github.com/verf1sh/Poc/blob/master/giflib_poc https://nvd.nist.gov/vuln/detail/CVE-2022-28506 https://sourceforge.net/p/giflib/bugs/159/
|
libglib2.0-0 |
CVE-2021-3800 |
MEDIUM |
2.56.4-0ubuntu0.18.04.8 |
2.56.4-0ubuntu0.18.04.9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3800 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800 https://linux.oracle.com/cve/CVE-2021-3800.html https://linux.oracle.com/errata/ELSA-2021-4385.html https://ubuntu.com/security/notices/USN-5189-1 https://www.openwall.com/lists/oss-security/2017/06/23/8
|
libgnutls30 |
CVE-2018-16868 |
LOW |
3.5.18-1ubuntu1.5 |
|
Expand...http://cat.eyalro.net/ http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html http://www.securityfocus.com/bid/106080 https://access.redhat.com/security/cve/CVE-2018-16868 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
|
libgssapi-krb5-2 |
CVE-2018-20217 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763 https://access.redhat.com/security/cve/CVE-2018-20217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217 https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086 https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/ https://security.netapp.com/advisory/ntap-20190416-0006/
|
libgssapi-krb5-2 |
CVE-2021-36222 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgssapi-krb5-2 |
CVE-2021-37750 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libgssapi3-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libgssapi3-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhcrypto4-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libhcrypto4-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimbase1-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libheimbase1-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimntlm0-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libheimntlm0-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhx509-5-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libhx509-5-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libinput-bin |
CVE-2022-1215 |
MEDIUM |
1.10.4-1ubuntu0.18.04.2 |
1.10.4-1ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1215 https://nvd.nist.gov/vuln/detail/CVE-2022-1215 https://seclists.org/oss-sec/2022/q2/47 https://ubuntu.com/security/notices/USN-5382-1 https://ubuntu.com/security/notices/USN-5382-2 https://www.openwall.com/lists/oss-security/2022/04/20/2
|
libinput10 |
CVE-2022-1215 |
MEDIUM |
1.10.4-1ubuntu0.18.04.2 |
1.10.4-1ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1215 https://nvd.nist.gov/vuln/detail/CVE-2022-1215 https://seclists.org/oss-sec/2022/q2/47 https://ubuntu.com/security/notices/USN-5382-1 https://ubuntu.com/security/notices/USN-5382-2 https://www.openwall.com/lists/oss-security/2022/04/20/2
|
libjack-jackd2-0 |
CVE-2019-13351 |
LOW |
1.9.12~dfsg-2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13351 https://github.com/jackaudio/jack2/pull/480 https://github.com/xbmc/xbmc/issues/16258
|
libjbig0 |
CVE-2017-9937 |
LOW |
2.1-3.1build1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://access.redhat.com/security/cve/CVE-2017-9937 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjpeg-turbo8 |
CVE-2018-11813 |
LOW |
1.5.2-0ubuntu5.18.04.4 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html http://www.ijg.org/files/jpegsrc.v9d.tar.gz https://access.redhat.com/errata/RHSA-2019:2052 https://access.redhat.com/security/cve/CVE-2018-11813 https://bugs.gentoo.org/727908 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813 https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c https://linux.oracle.com/cve/CVE-2018-11813.html https://linux.oracle.com/errata/ELSA-2019-2052.html
|
libjpeg-turbo8 |
CVE-2020-17541 |
LOW |
1.5.2-0ubuntu5.18.04.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libk5crypto3 |
CVE-2018-20217 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763 https://access.redhat.com/security/cve/CVE-2018-20217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217 https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086 https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/ https://security.netapp.com/advisory/ntap-20190416-0006/
|
libk5crypto3 |
CVE-2021-36222 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libk5crypto3 |
CVE-2021-37750 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libkrb5-26-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libkrb5-26-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libkrb5-3 |
CVE-2018-20217 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763 https://access.redhat.com/security/cve/CVE-2018-20217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217 https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086 https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/ https://security.netapp.com/advisory/ntap-20190416-0006/
|
libkrb5-3 |
CVE-2021-36222 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5-3 |
CVE-2021-37750 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libkrb5support0 |
CVE-2018-20217 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763 https://access.redhat.com/security/cve/CVE-2018-20217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217 https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086 https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/ https://security.netapp.com/advisory/ntap-20190416-0006/
|
libkrb5support0 |
CVE-2021-36222 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5support0 |
CVE-2021-37750 |
MEDIUM |
1.16-2ubuntu0.2 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libldap-2.4-2 |
CVE-2022-29155 |
MEDIUM |
2.4.45+dfsg-1ubuntu1.10 |
2.4.45+dfsg-1ubuntu1.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155 https://bugs.openldap.org/show_bug.cgi?id=9815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155 https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html https://nvd.nist.gov/vuln/detail/CVE-2022-29155 https://security.netapp.com/advisory/ntap-20220609-0007/ https://ubuntu.com/security/notices/USN-5424-1 https://ubuntu.com/security/notices/USN-5424-2 https://www.debian.org/security/2022/dsa-5140
|
libldap-common |
CVE-2022-29155 |
MEDIUM |
2.4.45+dfsg-1ubuntu1.10 |
2.4.45+dfsg-1ubuntu1.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155 https://bugs.openldap.org/show_bug.cgi?id=9815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155 https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html https://nvd.nist.gov/vuln/detail/CVE-2022-29155 https://security.netapp.com/advisory/ntap-20220609-0007/ https://ubuntu.com/security/notices/USN-5424-1 https://ubuntu.com/security/notices/USN-5424-2 https://www.debian.org/security/2022/dsa-5140
|
liblzma5 |
CVE-2022-1271 |
MEDIUM |
5.2.2-1.3 |
5.2.2-1.3ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 https://errata.almalinux.org/8/ALSA-2022-1537.html https://linux.oracle.com/cve/CVE-2022-1271.html https://linux.oracle.com/errata/ELSA-2022-5052.html https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html https://ubuntu.com/security/notices/USN-5378-1 https://ubuntu.com/security/notices/USN-5378-2 https://ubuntu.com/security/notices/USN-5378-3 https://ubuntu.com/security/notices/USN-5378-4 https://www.openwall.com/lists/oss-security/2022/04/07/8
|
libncurses5 |
CVE-2019-17594 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
libncurses5 |
CVE-2019-17595 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
libncurses5 |
CVE-2021-39537 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
libncurses5 |
CVE-2022-29458 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
libncursesw5 |
CVE-2019-17594 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
libncursesw5 |
CVE-2019-17595 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
libncursesw5 |
CVE-2021-39537 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
libncursesw5 |
CVE-2022-29458 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
libnghttp2-14 |
CVE-2019-9511 |
MEDIUM |
1.30.0-1ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html https://access.redhat.com/errata/RHSA-2019:2692 https://access.redhat.com/errata/RHSA-2019:2745 https://access.redhat.com/errata/RHSA-2019:2746 https://access.redhat.com/errata/RHSA-2019:2775 https://access.redhat.com/errata/RHSA-2019:2799 https://access.redhat.com/errata/RHSA-2019:2925 https://access.redhat.com/errata/RHSA-2019:2939 https://access.redhat.com/errata/RHSA-2019:2949 https://access.redhat.com/errata/RHSA-2019:2955 https://access.redhat.com/errata/RHSA-2019:2966 https://access.redhat.com/errata/RHSA-2019:3041 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4018 https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/errata/RHSA-2019:4020 https://access.redhat.com/errata/RHSA-2019:4021 https://access.redhat.com/security/cve/CVE-2019-9511 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511 https://errata.almalinux.org/8/ALSA-2019-2925.html https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md https://kb.cert.org/vuls/id/605641/ https://kc.mcafee.com/corporate/index?page=content&id=SB10296 https://linux.oracle.com/cve/CVE-2019-9511.html https://linux.oracle.com/errata/ELSA-2020-5862.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/ https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2019-9511 https://seclists.org/bugtraq/2019/Aug/40 https://seclists.org/bugtraq/2019/Sep/1 https://security.netapp.com/advisory/ntap-20190823-0002/ https://security.netapp.com/advisory/ntap-20190823-0005/ https://support.f5.com/csp/article/K02591030 https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4099-1 https://usn.ubuntu.com/4099-1/ https://www.debian.org/security/2019/dsa-4505 https://www.debian.org/security/2019/dsa-4511 https://www.debian.org/security/2020/dsa-4669 https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/ https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.synology.com/security/advisory/Synology_SA_19_33
|
libnghttp2-14 |
CVE-2019-9513 |
MEDIUM |
1.30.0-1ubuntu1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html https://access.redhat.com/errata/RHSA-2019:2692 https://access.redhat.com/errata/RHSA-2019:2745 https://access.redhat.com/errata/RHSA-2019:2746 https://access.redhat.com/errata/RHSA-2019:2775 https://access.redhat.com/errata/RHSA-2019:2799 https://access.redhat.com/errata/RHSA-2019:2925 https://access.redhat.com/errata/RHSA-2019:2939 https://access.redhat.com/errata/RHSA-2019:2949 https://access.redhat.com/errata/RHSA-2019:2955 https://access.redhat.com/errata/RHSA-2019:2966 https://access.redhat.com/errata/RHSA-2019:3041 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2019-9513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513 https://errata.almalinux.org/8/ALSA-2019-2925.html https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md https://kb.cert.org/vuls/id/605641/ https://kc.mcafee.com/corporate/index?page=content&id=SB10296 https://linux.oracle.com/cve/CVE-2019-9513.html https://linux.oracle.com/errata/ELSA-2019-2925.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/ https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/ https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2019-9513 https://seclists.org/bugtraq/2019/Aug/40 https://seclists.org/bugtraq/2019/Sep/1 https://security.netapp.com/advisory/ntap-20190823-0002/ https://security.netapp.com/advisory/ntap-20190823-0005/ https://support.f5.com/csp/article/K02591030 https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4099-1 https://usn.ubuntu.com/4099-1/ https://www.debian.org/security/2019/dsa-4505 https://www.debian.org/security/2019/dsa-4511 https://www.debian.org/security/2020/dsa-4669 https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/ https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.synology.com/security/advisory/Synology_SA_19_33
|
libpcre3 |
CVE-2017-11164 |
LOW |
2:8.39-9 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3 |
CVE-2019-20838 |
LOW |
2:8.39-9 |
2:8.39-9ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.pcre.org/original/changelog.txt
|
libpcre3 |
CVE-2020-14155 |
LOW |
2:8.39-9 |
2:8.39-9ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
libpng16-16 |
CVE-2018-14048 |
LOW |
1.6.34-1ubuntu0.18.04.2 |
|
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://access.redhat.com/security/cve/CVE-2018-14048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048 https://github.com/fouzhe/security/tree/master/libpng https://github.com/glennrp/libpng/issues/238 https://seclists.org/bugtraq/2019/Apr/30 https://security.gentoo.org/glsa/201908-02 https://ubuntu.com/security/notices/USN-5432-1
|
libpython2.7-minimal |
CVE-2021-4189 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
libpython2.7-minimal |
CVE-2022-0391 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libpython2.7-minimal |
CVE-2015-20107 |
LOW |
2.7.17-1~18.04ubuntu1.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython2.7-stdlib |
CVE-2021-4189 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
libpython2.7-stdlib |
CVE-2022-0391 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libpython2.7-stdlib |
CVE-2015-20107 |
LOW |
2.7.17-1~18.04ubuntu1.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython3.6-minimal |
CVE-2021-3733 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733 https://bugs.python.org/issue43075 https://bugzilla.redhat.com/show_bug.cgi?id=1995234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final https://errata.almalinux.org/8/ALSA-2022-1821.html https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14) https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master) https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5) https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11) https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10) https://github.com/python/cpython/pull/24391 https://linux.oracle.com/cve/CVE-2021-3733.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://nvd.nist.gov/vuln/detail/CVE-2021-3733 https://security.netapp.com/advisory/ntap-20220407-0001/ https://ubuntu.com/security/CVE-2021-3733 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1
|
libpython3.6-minimal |
CVE-2021-3737 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://security.netapp.com/advisory/ntap-20220407-0009/ https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
libpython3.6-minimal |
CVE-2021-4189 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
libpython3.6-minimal |
CVE-2022-0391 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libpython3.6-minimal |
CVE-2015-20107 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython3.6-minimal |
CVE-2021-3426 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426 https://bugzilla.redhat.com/show_bug.cgi?id=1935913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426 https://github.com/python/cpython/pull/24285 https://github.com/python/cpython/pull/24337 https://linux.oracle.com/cve/CVE-2021-3426.html https://linux.oracle.com/errata/ELSA-2021-9562.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/ https://python-security.readthedocs.io/vuln/pydoc-getfile.html https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210629-0003/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libpython3.6-stdlib |
CVE-2021-3733 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733 https://bugs.python.org/issue43075 https://bugzilla.redhat.com/show_bug.cgi?id=1995234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final https://errata.almalinux.org/8/ALSA-2022-1821.html https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14) https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master) https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5) https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11) https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10) https://github.com/python/cpython/pull/24391 https://linux.oracle.com/cve/CVE-2021-3733.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://nvd.nist.gov/vuln/detail/CVE-2021-3733 https://security.netapp.com/advisory/ntap-20220407-0001/ https://ubuntu.com/security/CVE-2021-3733 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1
|
libpython3.6-stdlib |
CVE-2021-3737 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://security.netapp.com/advisory/ntap-20220407-0009/ https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
libpython3.6-stdlib |
CVE-2021-4189 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
libpython3.6-stdlib |
CVE-2022-0391 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libpython3.6-stdlib |
CVE-2015-20107 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython3.6-stdlib |
CVE-2021-3426 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426 https://bugzilla.redhat.com/show_bug.cgi?id=1935913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426 https://github.com/python/cpython/pull/24285 https://github.com/python/cpython/pull/24337 https://linux.oracle.com/cve/CVE-2021-3426.html https://linux.oracle.com/errata/ELSA-2021-9562.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/ https://python-security.readthedocs.io/vuln/pydoc-getfile.html https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210629-0003/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
libqt5core5a |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libqt5dbus5 |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libqt5gui5 |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libqt5network5 |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libqt5printsupport5 |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libqt5svg5 |
CVE-2021-45930 |
MEDIUM |
5.9.5-0ubuntu1 |
5.9.5-0ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-45930 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37025 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37306 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45930 https://errata.almalinux.org/8/ALSA-2022-1920.html https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qt/OSV-2021-1121.yaml https://github.com/qt/qtsvg/commit/36cfd9efb9b22b891adee9c48d30202289cfa620 https://github.com/qt/qtsvg/commit/79bb9f51fa374106a612d17c9d98d35d807be670 https://github.com/qt/qtsvg/commit/a3b753c2d077313fc9eb93af547051b956e383fc https://linux.oracle.com/cve/CVE-2021-45930.html https://linux.oracle.com/errata/ELSA-2022-1920.html https://lists.debian.org/debian-lts-announce/2022/01/msg00020.html https://lists.debian.org/debian-lts-announce/2022/01/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GKOKVCSDZSOWWR3HOW5XUIUJC4MKQY5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GZIXNSX7FV733TWTTLY6FHSH3SCNQKKD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V75XNX4GDB64N5BSOAN474RUXXS5OHRU/ https://ubuntu.com/security/notices/USN-5241-1
|
libqt5svg5 |
CVE-2018-19869 |
LOW |
5.9.5-0ubuntu1 |
5.9.5-0ubuntu1.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html https://access.redhat.com/errata/RHSA-2019:2135 https://access.redhat.com/security/cve/CVE-2018-19869 https://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/ https://codereview.qt-project.org/#/c/234142/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19869 https://linux.oracle.com/cve/CVE-2018-19869.html https://linux.oracle.com/errata/ELSA-2020-1665.html https://lists.debian.org/debian-lts-announce/2019/05/msg00014.html https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html https://lists.debian.org/debian-lts-announce/2020/10/msg00035.html https://ubuntu.com/security/notices/USN-5241-1
|
libqt5svg5 |
CVE-2021-3481 |
LOW |
5.9.5-0ubuntu1 |
5.9.5-0ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3481 https://codereview.qt-project.org/c/qt/qtsvg/+/337587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3481 https://ubuntu.com/security/notices/USN-5241-1
|
libqt5widgets5 |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libqt5xml5 |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
libroken18-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libroken18-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
librsvg2-2 |
CVE-2019-20446 |
LOW |
2.40.20-2ubuntu0.2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html https://access.redhat.com/security/cve/CVE-2019-20446 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446 https://gitlab.gnome.org/GNOME/librsvg/issues/515 https://linux.oracle.com/cve/CVE-2019-20446.html https://linux.oracle.com/errata/ELSA-2020-4709.html https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/ https://ubuntu.com/security/notices/USN-4436-1 https://ubuntu.com/security/notices/USN-4436-2 https://usn.ubuntu.com/4436-1/
|
librsvg2-common |
CVE-2019-20446 |
LOW |
2.40.20-2ubuntu0.2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html https://access.redhat.com/security/cve/CVE-2019-20446 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446 https://gitlab.gnome.org/GNOME/librsvg/issues/515 https://linux.oracle.com/cve/CVE-2019-20446.html https://linux.oracle.com/errata/ELSA-2020-4709.html https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/ https://ubuntu.com/security/notices/USN-4436-1 https://ubuntu.com/security/notices/USN-4436-2 https://usn.ubuntu.com/4436-1/
|
libsasl2-2 |
CVE-2022-24407 |
HIGH |
2.1.27~101-g0780600+dfsg-3ubuntu2.3 |
2.1.27~101-g0780600+dfsg-3ubuntu2.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2022-24407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-9239.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ https://nvd.nist.gov/vuln/detail/CVE-2022-24407 https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsasl2-modules |
CVE-2022-24407 |
HIGH |
2.1.27~101-g0780600+dfsg-3ubuntu2.3 |
2.1.27~101-g0780600+dfsg-3ubuntu2.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2022-24407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-9239.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ https://nvd.nist.gov/vuln/detail/CVE-2022-24407 https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsasl2-modules-db |
CVE-2022-24407 |
HIGH |
2.1.27~101-g0780600+dfsg-3ubuntu2.3 |
2.1.27~101-g0780600+dfsg-3ubuntu2.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2022-24407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-9239.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ https://nvd.nist.gov/vuln/detail/CVE-2022-24407 https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
libsepol1 |
CVE-2021-36084 |
LOW |
2.7-1 |
2.7-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
libsepol1 |
CVE-2021-36085 |
LOW |
2.7-1 |
2.7-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
libsepol1 |
CVE-2021-36086 |
LOW |
2.7-1 |
2.7-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
libsepol1 |
CVE-2021-36087 |
LOW |
2.7-1 |
2.7-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/ https://ubuntu.com/security/notices/USN-5391-1
|
libsndfile1 |
CVE-2021-4156 |
LOW |
1.0.28-4ubuntu0.18.04.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2027690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4156 https://errata.almalinux.org/8/ALSA-2022-1968.html https://github.com/libsndfile/libsndfile/issues/731 https://github.com/libsndfile/libsndfile/pull/732/commits/4c30646abf7834e406f7e2429c70bc254e18beab https://linux.oracle.com/cve/CVE-2021-4156.html https://linux.oracle.com/errata/ELSA-2022-1968.html https://ubuntu.com/security/notices/USN-5409-1
|
libspeexdsp1 |
CVE-2020-23903 |
MEDIUM |
1.2~rc1.2-1ubuntu2 |
1.2~rc1.2-1ubuntu2.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-23903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23903 https://github.com/xiph/speex/issues/13 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/ https://ubuntu.com/security/notices/USN-5280-1
|
libsqlcipher0 |
CVE-2019-8457 |
MEDIUM |
4.3.0-0~202102181541~462~202104031456~ubuntu18.04.1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html https://access.redhat.com/security/cve/CVE-2019-8457 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-8457.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/ https://security.netapp.com/advisory/ntap-20190606-0002/ https://ubuntu.com/security/notices/USN-4004-1 https://ubuntu.com/security/notices/USN-4004-2 https://ubuntu.com/security/notices/USN-4019-1 https://ubuntu.com/security/notices/USN-4019-2 https://usn.ubuntu.com/4004-1/ https://usn.ubuntu.com/4004-2/ https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.sqlite.org/releaselog/3_28_0.html https://www.sqlite.org/src/info/90acdbfce9c08858
|
libsqlite3-0 |
CVE-2020-9794 |
MEDIUM |
3.22.0-1ubuntu0.4 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 https://vuldb.com/?id.155768
|
libsqlite3-0 |
CVE-2020-9849 |
LOW |
3.22.0-1ubuntu0.4 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
libsqlite3-0 |
CVE-2020-9991 |
LOW |
3.22.0-1ubuntu0.4 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211847 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/kb/HT211846 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
libsqlite3-0 |
CVE-2021-36690 |
LOW |
3.22.0-1ubuntu0.4 |
3.22.0-1ubuntu0.5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://nvd.nist.gov/vuln/detail/CVE-2021-36690 https://ubuntu.com/security/notices/USN-5403-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
libss2 |
CVE-2022-1304 |
MEDIUM |
1.44.1-1ubuntu1.3 |
1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
libssl1.0.0 |
CVE-2022-0778 |
HIGH |
1.0.2n-1ubuntu5.7 |
1.0.2n-1ubuntu5.8 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json https://access.redhat.com/security/cve/CVE-2022-0778 https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://errata.almalinux.org/8/ALSA-2022-1065.html https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9272.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://security.netapp.com/advisory/ntap-20220429-0005/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-06 https://www.tenable.com/security/tns-2022-07 https://www.tenable.com/security/tns-2022-08 https://www.tenable.com/security/tns-2022-09
|
libssl1.0.0 |
CVE-2022-1292 |
MEDIUM |
1.0.2n-1ubuntu5.7 |
1.0.2n-1ubuntu5.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
libssl1.0.0 |
CVE-2022-2068 |
MEDIUM |
1.0.2n-1ubuntu5.7 |
1.0.2n-1ubuntu5.10 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
libssl1.1 |
CVE-2022-0778 |
HIGH |
1.1.1-1ubuntu2.1~18.04.13 |
1.1.1-1ubuntu2.1~18.04.15 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json https://access.redhat.com/security/cve/CVE-2022-0778 https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://errata.almalinux.org/8/ALSA-2022-1065.html https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9272.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://security.netapp.com/advisory/ntap-20220429-0005/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-06 https://www.tenable.com/security/tns-2022-07 https://www.tenable.com/security/tns-2022-08 https://www.tenable.com/security/tns-2022-09
|
libssl1.1 |
CVE-2022-1292 |
MEDIUM |
1.1.1-1ubuntu2.1~18.04.13 |
1.1.1-1ubuntu2.1~18.04.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
libssl1.1 |
CVE-2022-2068 |
MEDIUM |
1.1.1-1ubuntu2.1~18.04.13 |
1.1.1-1ubuntu2.1~18.04.19 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
libstdc++6 |
CVE-2020-13844 |
MEDIUM |
8.4.0-1ubuntu1~18.04 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libtiff5 |
CVE-2022-0865 |
MEDIUM |
4.0.9-5ubuntu0.4 |
4.0.9-5ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067 https://gitlab.com/libtiff/libtiff/-/issues/385 https://gitlab.com/libtiff/libtiff/-/merge_requests/306 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/ https://nvd.nist.gov/vuln/detail/CVE-2022-0865 https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-0891 |
MEDIUM |
4.0.9-5ubuntu0.4 |
4.0.9-5ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/libtiff/libtiff/-/issues/380 https://gitlab.com/libtiff/libtiff/-/issues/382 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/ https://nvd.nist.gov/vuln/detail/CVE-2022-0891 https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-1354 |
MEDIUM |
4.0.9-5ubuntu0.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354 https://gitlab.com/libtiff/libtiff/-/issues/319
|
libtiff5 |
CVE-2018-10126 |
LOW |
4.0.9-5ubuntu0.4 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://access.redhat.com/security/cve/CVE-2018-10126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2020-19131 |
LOW |
4.0.9-5ubuntu0.4 |
|
Expand...http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/ http://bugzilla.maptools.org/show_bug.cgi?id=2831 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19131.json https://access.redhat.com/security/cve/CVE-2020-19131 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131 https://errata.almalinux.org/8/ALSA-2022-1810.html https://linux.oracle.com/cve/CVE-2020-19131.html https://linux.oracle.com/errata/ELSA-2022-1810.html https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
|
libtiff5 |
CVE-2020-19144 |
LOW |
4.0.9-5ubuntu0.4 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2852 https://access.redhat.com/security/cve/CVE-2020-19144 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144 https://gitlab.com/libtiff/libtiff/-/issues/159 https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html https://security.netapp.com/advisory/ntap-20211004-0005/
|
libtiff5 |
CVE-2020-35522 |
LOW |
4.0.9-5ubuntu0.4 |
4.0.9-5ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35522 https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://nvd.nist.gov/vuln/detail/CVE-2020-35522 https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/ https://ubuntu.com/security/notices/USN-5421-1
|
libtiff5 |
CVE-2022-0561 |
LOW |
4.0.9-5ubuntu0.4 |
4.0.9-5ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0561 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0561 https://security.netapp.com/advisory/ntap-20220318-0001/ https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-0562 |
LOW |
4.0.9-5ubuntu0.4 |
4.0.9-5ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0562 https://security.netapp.com/advisory/ntap-20220318-0001/ https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-22844 |
LOW |
4.0.9-5ubuntu0.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-22844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2022-22844 https://security.netapp.com/advisory/ntap-20220311-0002/ https://www.debian.org/security/2022/dsa-5108
|
libtinfo5 |
CVE-2019-17594 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
libtinfo5 |
CVE-2019-17595 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
libtinfo5 |
CVE-2021-39537 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
libtinfo5 |
CVE-2022-29458 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
libvorbis0a |
CVE-2017-14160 |
LOW |
1.3.5-4.2 |
|
Expand...http://openwall.com/lists/oss-security/2017/09/21/2 http://www.openwall.com/lists/oss-security/2017/09/21/2 http://www.openwall.com/lists/oss-security/2017/09/21/3 http://www.securityfocus.com/bid/101045 https://access.redhat.com/security/cve/CVE-2017-14160 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160 https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html https://security.gentoo.org/glsa/202003-36 https://ubuntu.com/security/notices/USN-5420-1
|
libvorbis0a |
CVE-2018-10392 |
LOW |
1.3.5-4.2 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:3703 https://access.redhat.com/security/cve/CVE-2018-10392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392 https://gitlab.xiph.org/xiph/vorbis/issues/2335 https://linux.oracle.com/cve/CVE-2018-10392.html https://linux.oracle.com/errata/ELSA-2019-3703.html https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2018-10392 https://security.gentoo.org/glsa/202003-36 https://ubuntu.com/security/notices/USN-5420-1
|
libvorbis0a |
CVE-2018-10393 |
LOW |
1.3.5-4.2 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:3703 https://access.redhat.com/security/cve/CVE-2018-10393 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393 https://gitlab.xiph.org/xiph/vorbis/issues/2334 https://linux.oracle.com/cve/CVE-2018-10393.html https://linux.oracle.com/errata/ELSA-2019-3703.html https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2018-10393 https://security.gentoo.org/glsa/202003-36 https://ubuntu.com/security/notices/USN-5420-1
|
libvorbisenc2 |
CVE-2017-14160 |
LOW |
1.3.5-4.2 |
|
Expand...http://openwall.com/lists/oss-security/2017/09/21/2 http://www.openwall.com/lists/oss-security/2017/09/21/2 http://www.openwall.com/lists/oss-security/2017/09/21/3 http://www.securityfocus.com/bid/101045 https://access.redhat.com/security/cve/CVE-2017-14160 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160 https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html https://security.gentoo.org/glsa/202003-36 https://ubuntu.com/security/notices/USN-5420-1
|
libvorbisenc2 |
CVE-2018-10392 |
LOW |
1.3.5-4.2 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:3703 https://access.redhat.com/security/cve/CVE-2018-10392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392 https://gitlab.xiph.org/xiph/vorbis/issues/2335 https://linux.oracle.com/cve/CVE-2018-10392.html https://linux.oracle.com/errata/ELSA-2019-3703.html https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2018-10392 https://security.gentoo.org/glsa/202003-36 https://ubuntu.com/security/notices/USN-5420-1
|
libvorbisenc2 |
CVE-2018-10393 |
LOW |
1.3.5-4.2 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:3703 https://access.redhat.com/security/cve/CVE-2018-10393 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393 https://gitlab.xiph.org/xiph/vorbis/issues/2334 https://linux.oracle.com/cve/CVE-2018-10393.html https://linux.oracle.com/errata/ELSA-2019-3703.html https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2018-10393 https://security.gentoo.org/glsa/202003-36 https://ubuntu.com/security/notices/USN-5420-1
|
libwind0-heimdal |
CVE-2019-12098 |
LOW |
7.5.0+dfsg-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098 https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf https://github.com/heimdal/heimdal/compare/3e58559...bbafe72 https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/ https://seclists.org/bugtraq/2019/Jun/1 https://www.debian.org/security/2019/dsa-4455
|
libwind0-heimdal |
CVE-2021-3671 |
LOW |
7.5.0+dfsg-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libwinpr2-2 |
CVE-2022-24882 |
MEDIUM |
2.2.0+dfsg1-0ubuntu0.18.04.2 |
2.2.0+dfsg1-0ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24882 https://github.com/FreeRDP/FreeRDP/pull/7750 https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/ https://ubuntu.com/security/notices/USN-5461-1
|
libwinpr2-2 |
CVE-2022-24883 |
LOW |
2.2.0+dfsg1-0ubuntu0.18.04.2 |
2.2.0+dfsg1-0ubuntu0.18.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24883 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24883 https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144 https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/ https://ubuntu.com/security/notices/USN-5461-1
|
libxml2 |
CVE-2022-23308 |
MEDIUM |
2.9.4+dfsg1-6.1ubuntu1.4 |
2.9.4+dfsg1-6.1ubuntu1.5 |
Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/34 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/36 http://seclists.org/fulldisclosure/2022/May/37 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/security/cve/CVE-2022-23308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308 https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS https://linux.oracle.com/cve/CVE-2022-23308.html https://linux.oracle.com/errata/ELSA-2022-0899.html https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/ https://nvd.nist.gov/vuln/detail/CVE-2022-23308 https://security.netapp.com/advisory/ntap-20220331-0008/ https://support.apple.com/kb/HT213253 https://support.apple.com/kb/HT213254 https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://support.apple.com/kb/HT213258 https://ubuntu.com/security/notices/USN-5324-1 https://ubuntu.com/security/notices/USN-5422-1
|
libxml2 |
CVE-2022-29824 |
MEDIUM |
2.9.4+dfsg1-6.1ubuntu1.4 |
2.9.4+dfsg1-6.1ubuntu1.6 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html https://access.redhat.com/security/cve/CVE-2022-29824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824 https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14) https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master) https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 https://gitlab.gnome.org/GNOME/libxslt/-/tags https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/ https://nvd.nist.gov/vuln/detail/CVE-2022-29824 https://ubuntu.com/security/notices/USN-5422-1 https://www.debian.org/security/2022/dsa-5142
|
locales |
CVE-2021-3999 |
MEDIUM |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
locales |
CVE-2009-5155 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
locales |
CVE-2015-8985 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
locales |
CVE-2016-10228 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
locales |
CVE-2016-20013 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
locales |
CVE-2019-25013 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
locales |
CVE-2020-27618 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
locales |
CVE-2020-29562 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2020-6096 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
locales |
CVE-2021-3326 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
locales |
CVE-2021-35942 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
locales |
CVE-2022-23218 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
locales |
CVE-2022-23219 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
login |
CVE-2013-4235 |
LOW |
1:4.5-1ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-4235 https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
login |
CVE-2018-7169 |
LOW |
1:4.5-1ubuntu2 |
1:4.5-1ubuntu2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169 https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 https://github.com/shadow-maint/shadow/pull/97 https://security.gentoo.org/glsa/201805-09 https://ubuntu.com/security/notices/USN-5254-1
|
multiarch-support |
CVE-2021-3999 |
MEDIUM |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
multiarch-support |
CVE-2009-5155 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
multiarch-support |
CVE-2015-8985 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
multiarch-support |
CVE-2016-10228 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
multiarch-support |
CVE-2016-20013 |
LOW |
2.27-3ubuntu1.4 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
multiarch-support |
CVE-2019-25013 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
multiarch-support |
CVE-2020-27618 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
multiarch-support |
CVE-2020-29562 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26923 https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html https://ubuntu.com/security/notices/USN-5310-1
|
multiarch-support |
CVE-2020-6096 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ https://nvd.nist.gov/vuln/detail/CVE-2020-6096 https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/attachment.cgi?id=12334 https://sourceware.org/bugzilla/show_bug.cgi?id=25620 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019 https://ubuntu.com/security/notices/USN-4954-1 https://ubuntu.com/security/notices/USN-5310-1 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
|
multiarch-support |
CVE-2021-3326 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2 https://access.redhat.com/security/cve/CVE-2021-3326 https://bugs.chromium.org/p/project-zero/issues/detail?id=2146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326 https://linux.oracle.com/cve/CVE-2021-3326.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2021-3326 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210304-0007/ https://sourceware.org/bugzilla/show_bug.cgi?id=27256 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
multiarch-support |
CVE-2021-35942 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
multiarch-support |
CVE-2022-23218 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
multiarch-support |
CVE-2022-23219 |
LOW |
2.27-3ubuntu1.4 |
2.27-3ubuntu1.5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
ncurses-base |
CVE-2019-17594 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-base |
CVE-2019-17595 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-base |
CVE-2021-39537 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-base |
CVE-2022-29458 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-bin |
CVE-2019-17594 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-bin |
CVE-2019-17595 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-bin |
CVE-2021-39537 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-bin |
CVE-2022-29458 |
LOW |
6.1-1ubuntu1.18.04 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
nodejs |
CVE-2018-12115 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...http://www.securityfocus.com/bid/105127 https://access.redhat.com/errata/RHSA-2018:2552 https://access.redhat.com/errata/RHSA-2018:2553 https://access.redhat.com/errata/RHSA-2018:2944 https://access.redhat.com/errata/RHSA-2018:2949 https://access.redhat.com/errata/RHSA-2018:3537 https://access.redhat.com/security/cve/CVE-2018-12115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12115 https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ https://security.gentoo.org/glsa/202003-48
|
nodejs |
CVE-2018-12116 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:1821 https://access.redhat.com/security/cve/CVE-2018-12116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116 https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2018-12116 https://security.gentoo.org/glsa/202003-48
|
nodejs |
CVE-2018-12121 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...http://www.securityfocus.com/bid/106043 https://access.redhat.com/errata/RHSA-2019:1821 https://access.redhat.com/errata/RHSA-2019:2258 https://access.redhat.com/errata/RHSA-2019:3497 https://access.redhat.com/security/cve/CVE-2018-12121 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-12121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12121 https://linux.oracle.com/cve/CVE-2018-12121.html https://linux.oracle.com/errata/ELSA-2019-3497.html https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2018-12121 https://security.gentoo.org/glsa/202003-48
|
nodejs |
CVE-2018-12122 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...http://www.securityfocus.com/bid/106043 https://access.redhat.com/errata/RHSA-2019:1821 https://access.redhat.com/security/cve/CVE-2018-12122 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12122 https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2018-12122 https://security.gentoo.org/glsa/202003-48
|
nodejs |
CVE-2018-7160 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-7160 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7160 https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/ https://support.f5.com/csp/article/K63025104?utm_source=f5support&utm_medium=RSS
|
nodejs |
CVE-2018-7167 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...http://www.securityfocus.com/bid/106363 https://access.redhat.com/security/cve/CVE-2018-7167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7167 https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/ https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/#calls-to-buffer-fill-and-or-buffer-alloc-may-hang-cve-2018-7167 https://nvd.nist.gov/vuln/detail/CVE-2018-7167 https://security.gentoo.org/glsa/202003-48
|
nodejs |
CVE-2019-5737 |
MEDIUM |
14.18.1-1nodesource1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00059.html https://access.redhat.com/errata/RHSA-2019:1821 https://access.redhat.com/security/cve/CVE-2019-5737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5737 https://errata.almalinux.org/8/ALSA-2019-2925.html https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/ https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2019-5737 https://security.gentoo.org/glsa/202003-48 https://security.netapp.com/advisory/ntap-20190502-0008/
|
nodejs |
CVE-2018-12123 |
LOW |
14.18.1-1nodesource1 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:1821 https://access.redhat.com/security/cve/CVE-2018-12123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12123 https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2018-12123 https://security.gentoo.org/glsa/202003-48
|
nodejs |
CVE-2018-7159 |
LOW |
14.18.1-1nodesource1 |
|
Expand...https://access.redhat.com/errata/RHSA-2019:2258 https://access.redhat.com/security/cve/CVE-2018-7159 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7159 https://linux.oracle.com/cve/CVE-2018-7159.html https://linux.oracle.com/errata/ELSA-2019-2258.html https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/ https://support.f5.com/csp/article/K27228191?utm_source=f5support&utm_medium=RSS
|
openssh-client |
CVE-2020-14145 |
LOW |
1:7.6p1-4ubuntu0.5 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
openssh-client |
CVE-2021-41617 |
LOW |
1:7.6p1-4ubuntu0.5 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://errata.almalinux.org/8/ALSA-2022-2013.html https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2022-2013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
openssl |
CVE-2022-0778 |
HIGH |
1.1.1-1ubuntu2.1~18.04.13 |
1.1.1-1ubuntu2.1~18.04.15 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json https://access.redhat.com/security/cve/CVE-2022-0778 https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://errata.almalinux.org/8/ALSA-2022-1065.html https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9272.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://security.netapp.com/advisory/ntap-20220429-0005/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-06 https://www.tenable.com/security/tns-2022-07 https://www.tenable.com/security/tns-2022-08 https://www.tenable.com/security/tns-2022-09
|
openssl |
CVE-2022-1292 |
MEDIUM |
1.1.1-1ubuntu2.1~18.04.13 |
1.1.1-1ubuntu2.1~18.04.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
openssl |
CVE-2022-2068 |
MEDIUM |
1.1.1-1ubuntu2.1~18.04.13 |
1.1.1-1ubuntu2.1~18.04.19 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
passwd |
CVE-2013-4235 |
LOW |
1:4.5-1ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-4235 https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
passwd |
CVE-2018-7169 |
LOW |
1:4.5-1ubuntu2 |
1:4.5-1ubuntu2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169 https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169 https://github.com/shadow-maint/shadow/pull/97 https://security.gentoo.org/glsa/201805-09 https://ubuntu.com/security/notices/USN-5254-1
|
perl-base |
CVE-2020-16156 |
MEDIUM |
5.26.1-6ubuntu0.5 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
python2.7 |
CVE-2021-4189 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
python2.7 |
CVE-2022-0391 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
python2.7 |
CVE-2015-20107 |
LOW |
2.7.17-1~18.04ubuntu1.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python2.7-minimal |
CVE-2021-4189 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
python2.7-minimal |
CVE-2022-0391 |
MEDIUM |
2.7.17-1~18.04ubuntu1.6 |
2.7.17-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
python2.7-minimal |
CVE-2015-20107 |
LOW |
2.7.17-1~18.04ubuntu1.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python3.6 |
CVE-2021-3733 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733 https://bugs.python.org/issue43075 https://bugzilla.redhat.com/show_bug.cgi?id=1995234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final https://errata.almalinux.org/8/ALSA-2022-1821.html https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14) https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master) https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5) https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11) https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10) https://github.com/python/cpython/pull/24391 https://linux.oracle.com/cve/CVE-2021-3733.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://nvd.nist.gov/vuln/detail/CVE-2021-3733 https://security.netapp.com/advisory/ntap-20220407-0001/ https://ubuntu.com/security/CVE-2021-3733 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1
|
python3.6 |
CVE-2021-3737 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://security.netapp.com/advisory/ntap-20220407-0009/ https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
python3.6 |
CVE-2021-4189 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
python3.6 |
CVE-2022-0391 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
python3.6 |
CVE-2015-20107 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python3.6 |
CVE-2021-3426 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426 https://bugzilla.redhat.com/show_bug.cgi?id=1935913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426 https://github.com/python/cpython/pull/24285 https://github.com/python/cpython/pull/24337 https://linux.oracle.com/cve/CVE-2021-3426.html https://linux.oracle.com/errata/ELSA-2021-9562.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/ https://python-security.readthedocs.io/vuln/pydoc-getfile.html https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210629-0003/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
python3.6-minimal |
CVE-2021-3733 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733 https://bugs.python.org/issue43075 https://bugzilla.redhat.com/show_bug.cgi?id=1995234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final https://errata.almalinux.org/8/ALSA-2022-1821.html https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14) https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master) https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5) https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11) https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10) https://github.com/python/cpython/pull/24391 https://linux.oracle.com/cve/CVE-2021-3733.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://nvd.nist.gov/vuln/detail/CVE-2021-3733 https://security.netapp.com/advisory/ntap-20220407-0001/ https://ubuntu.com/security/CVE-2021-3733 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1
|
python3.6-minimal |
CVE-2021-3737 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://security.netapp.com/advisory/ntap-20220407-0009/ https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
python3.6-minimal |
CVE-2021-4189 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
python3.6-minimal |
CVE-2022-0391 |
MEDIUM |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
python3.6-minimal |
CVE-2015-20107 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python3.6-minimal |
CVE-2021-3426 |
LOW |
3.6.9-1~18.04ubuntu1.4 |
3.6.9-1~18.04ubuntu1.7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426 https://bugzilla.redhat.com/show_bug.cgi?id=1935913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426 https://github.com/python/cpython/pull/24285 https://github.com/python/cpython/pull/24337 https://linux.oracle.com/cve/CVE-2021-3426.html https://linux.oracle.com/errata/ELSA-2021-9562.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/ https://python-security.readthedocs.io/vuln/pydoc-getfile.html https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210629-0003/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
qt5-gtk-platformtheme |
CVE-2015-9541 |
LOW |
5.9.5+dfsg-0ubuntu2.6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-9541 https://bugreports.qt.io/browse/QTBUG-47417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9541 https://linux.oracle.com/cve/CVE-2015-9541.html https://linux.oracle.com/errata/ELSA-2020-4690.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ https://nvd.nist.gov/vuln/detail/CVE-2015-9541
|
tar |
CVE-2021-20193 |
LOW |
1.29b-2ubuntu0.2 |
1.29b-2ubuntu0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193 https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 https://savannah.gnu.org/bugs/?59897 https://security.gentoo.org/glsa/202105-29 https://ubuntu.com/security/notices/USN-5329-1
|
x11-common |
CVE-2012-1093 |
LOW |
1:7.7+19ubuntu7.1 |
|
Expand...http://vladz.devzero.fr/012_x11-common-vuln.html http://www.openwall.com/lists/oss-security/2012/02/29/1 http://www.openwall.com/lists/oss-security/2012/03/01/1 https://access.redhat.com/security/cve/cve-2012-1093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2012-1093
|
xorgxrdp |
CVE-2020-4044 |
MEDIUM |
0.9.5-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044 https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1 https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4 https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html https://www.debian.org/security/2020/dsa-4737
|
xrdp |
CVE-2020-4044 |
MEDIUM |
0.9.5-2 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044 https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1 https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4 https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html https://www.debian.org/security/2020/dsa-4737
|
xserver-common |
CVE-2021-4008 |
MEDIUM |
2:1.19.6-1ubuntu4.9 |
2:1.19.6-1ubuntu4.10 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4008 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008 https://errata.almalinux.org/8/ALSA-2022-1917.html https://linux.oracle.com/cve/CVE-2021-4008.html https://linux.oracle.com/errata/ELSA-2022-1917.html https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ https://lists.x.org/archives/xorg-announce/2021-December/003122.html https://lists.x.org/archives/xorg-announce/2021-December/003124.html https://security.netapp.com/advisory/ntap-20220114-0004/ https://ubuntu.com/security/notices/USN-5193-1 https://ubuntu.com/security/notices/USN-5193-2 https://www.debian.org/security/2021/dsa-5027 https://www.openwall.com/lists/oss-security/2021/12/14/1 https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
|
xserver-common |
CVE-2021-4009 |
MEDIUM |
2:1.19.6-1ubuntu4.9 |
2:1.19.6-1ubuntu4.10 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4009 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009 https://errata.almalinux.org/8/ALSA-2022-1917.html https://linux.oracle.com/cve/CVE-2021-4009.html https://linux.oracle.com/errata/ELSA-2022-1917.html https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ https://lists.x.org/archives/xorg-announce/2021-December/003122.html https://lists.x.org/archives/xorg-announce/2021-December/003124.html https://security.netapp.com/advisory/ntap-20220114-0004/ https://ubuntu.com/security/notices/USN-5193-1 https://ubuntu.com/security/notices/USN-5193-2 https://www.debian.org/security/2021/dsa-5027 https://www.openwall.com/lists/oss-security/2021/12/14/1 https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
|
xserver-common |
CVE-2021-4011 |
MEDIUM |
2:1.19.6-1ubuntu4.9 |
2:1.19.6-1ubuntu4.10 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4011 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011 https://errata.almalinux.org/8/ALSA-2022-1917.html https://linux.oracle.com/cve/CVE-2021-4011.html https://linux.oracle.com/errata/ELSA-2022-1917.html https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ https://lists.x.org/archives/xorg-announce/2021-December/003122.html https://lists.x.org/archives/xorg-announce/2021-December/003124.html https://security.netapp.com/advisory/ntap-20220114-0004/ https://ubuntu.com/security/notices/USN-5193-1 https://ubuntu.com/security/notices/USN-5193-2 https://www.debian.org/security/2021/dsa-5027 https://www.openwall.com/lists/oss-security/2021/12/14/1 https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
|
xserver-xorg-core |
CVE-2021-4008 |
MEDIUM |
2:1.19.6-1ubuntu4.9 |
2:1.19.6-1ubuntu4.10 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4008 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008 https://errata.almalinux.org/8/ALSA-2022-1917.html https://linux.oracle.com/cve/CVE-2021-4008.html https://linux.oracle.com/errata/ELSA-2022-1917.html https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ https://lists.x.org/archives/xorg-announce/2021-December/003122.html https://lists.x.org/archives/xorg-announce/2021-December/003124.html https://security.netapp.com/advisory/ntap-20220114-0004/ https://ubuntu.com/security/notices/USN-5193-1 https://ubuntu.com/security/notices/USN-5193-2 https://www.debian.org/security/2021/dsa-5027 https://www.openwall.com/lists/oss-security/2021/12/14/1 https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
|
xserver-xorg-core |
CVE-2021-4009 |
MEDIUM |
2:1.19.6-1ubuntu4.9 |
2:1.19.6-1ubuntu4.10 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4009 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009 https://errata.almalinux.org/8/ALSA-2022-1917.html https://linux.oracle.com/cve/CVE-2021-4009.html https://linux.oracle.com/errata/ELSA-2022-1917.html https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ https://lists.x.org/archives/xorg-announce/2021-December/003122.html https://lists.x.org/archives/xorg-announce/2021-December/003124.html https://security.netapp.com/advisory/ntap-20220114-0004/ https://ubuntu.com/security/notices/USN-5193-1 https://ubuntu.com/security/notices/USN-5193-2 https://www.debian.org/security/2021/dsa-5027 https://www.openwall.com/lists/oss-security/2021/12/14/1 https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
|
xserver-xorg-core |
CVE-2021-4011 |
MEDIUM |
2:1.19.6-1ubuntu4.9 |
2:1.19.6-1ubuntu4.10 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4011 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011 https://errata.almalinux.org/8/ALSA-2022-1917.html https://linux.oracle.com/cve/CVE-2021-4011.html https://linux.oracle.com/errata/ELSA-2022-1917.html https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ https://lists.x.org/archives/xorg-announce/2021-December/003122.html https://lists.x.org/archives/xorg-announce/2021-December/003124.html https://security.netapp.com/advisory/ntap-20220114-0004/ https://ubuntu.com/security/notices/USN-5193-1 https://ubuntu.com/security/notices/USN-5193-2 https://www.debian.org/security/2021/dsa-5027 https://www.openwall.com/lists/oss-security/2021/12/14/1 https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
|
xutils |
CVE-2012-1093 |
LOW |
1:7.7+19ubuntu7.1 |
|
Expand...http://vladz.devzero.fr/012_x11-common-vuln.html http://www.openwall.com/lists/oss-security/2012/02/29/1 http://www.openwall.com/lists/oss-security/2012/03/01/1 https://access.redhat.com/security/cve/cve-2012-1093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2012-1093
|
zlib1g |
CVE-2018-25032 |
MEDIUM |
1:1.2.11.dfsg-0ubuntu2 |
1:1.2.11.dfsg-0ubuntu2.1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 http://www.openwall.com/lists/oss-security/2022/03/25/2 http://www.openwall.com/lists/oss-security/2022/03/26/1 https://access.redhat.com/security/cve/CVE-2018-25032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032 https://errata.almalinux.org/8/ALSA-2022-2201.html https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 https://github.com/madler/zlib/issues/605 https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4 https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5 https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ https://linux.oracle.com/cve/CVE-2018-25032.html https://linux.oracle.com/errata/ELSA-2022-2213.html https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/ https://nvd.nist.gov/vuln/detail/CVE-2018-25032 https://security.netapp.com/advisory/ntap-20220526-0009/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5355-1 https://ubuntu.com/security/notices/USN-5355-2 https://ubuntu.com/security/notices/USN-5359-1 https://ubuntu.com/security/notices/USN-5359-2 https://www.debian.org/security/2022/dsa-5111 https://www.openwall.com/lists/oss-security/2022/03/24/1 https://www.openwall.com/lists/oss-security/2022/03/28/1 https://www.openwall.com/lists/oss-security/2022/03/28/3
|